Extracting prog: 11m14.542230671s Minimizing prog: 1h15m36.978889983s Simplifying prog options: 0s Extracting C: 8m37.915541256s Simplifying C: 58m27.326049064s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r0}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h33m56.762733084s repro crashed as (corrupted=false): INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:8324a400 r4:8324a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6fe00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb805000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fd78c r4:858fd400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858fd78c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: cc986000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df911d84 r8:00000002 r7:60000113 r6:df911d8c r5:833a8c00 r4:833a8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833a8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b98240 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850adb8c r4:850ad800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850adb8c r4:83363580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a8c00 r8:833635ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83363580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363580 r8:8027ed34 r7:df841e60 r6:83363600 r5:833a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8335fe00 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: cc986000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/1:2:1470 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:1470 tgid:1470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eae4dd84 r8:00000002 r7:60000113 r6:eae4dd8c r5:832fa400 r4:832fa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832fa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84773200 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe1d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fef8c r4:858fec00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858fef8c r4:841e3980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832fa400 r8:841e39ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:841e3980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841e3980 r8:8027ed34 r7:df921e60 r6:841e3a00 r5:832fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841ec3c0 INFO: task kworker/1:2:1470 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: cdfc0000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/1:1:3107 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3107 tgid:3107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df97dd84 r8:00000002 r7:60000113 r6:df97dd8c r5:842aec00 r4:842aec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842aec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df97de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84773a00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec75f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85900b8c r4:85900800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85900b8c r4:84741a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842aec00 r8:84741a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741a00 r8:8027ed34 r7:eae4de60 r6:849f7c80 r5:842aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf97dfb0 to 0xdf97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84744080 INFO: task kworker/1:1:3107 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: ce9f4000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/0:3:3112 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3112 tgid:3112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df981d84 r8:00000002 r7:60000113 r6:df981d8c r5:838a6000 r4:838a6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838a6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506b480 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503e78c r4:8503e400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503e78c r4:849f7e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a6000 r8:849f7e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:849f7e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f7e00 r8:8027ed34 r7:ec77de60 r6:849f7900 r5:838a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8473e280 INFO: task kworker/0:3:3112 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: cf3d5000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/0:5:3117 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:842c3000 r4:842c3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842c3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8c80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525fb8c r4:8525f800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525fb8c r4:849f7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c3000 r8:849f7fac r7:82804d40 r6:dddced40 r5:dddced60 r4:849f7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f7f80 r8:8027ed34 r7:df981e60 r6:849f7c00 r5:842c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8473e300 INFO: task kworker/0:5:3117 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: cf97b000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/1:7:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:842c2400 r4:842c2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842c2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85079bc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe71000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ae78c r4:850ae400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ae78c r4:84741c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c2400 r8:84741cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741c80 r8:8027ed34 r7:df9d9e60 r6:838dd280 r5:842c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84744700 INFO: task kworker/1:7:3122 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: cfd57000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/1:8:3124 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df969d84 r8:00000002 r7:60000013 r6:df969d8c r5:842c5400 r4:842c5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842c5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df969e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85190000 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd31000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850af78c r4:850af400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850af78c r4:84741d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c5400 r8:84741d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741d00 r8:8027ed34 r7:df9e5e60 r6:830b8480 r5:842c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf969fb0 to 0xdf969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84744880 INFO: task kworker/1:8:3124 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: cfd57000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/0:6:3133 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:84288c00 r4:84288c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84288c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a0780 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84288c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525eb8c r4:8525e800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525eb8c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84288c00 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:df9b9e60 r6:84445800 r5:84288c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8473ec00 INFO: task kworker/0:6:3133 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d018b000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 INFO: task kworker/1:9:3134 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:8428ec00 r4:8428ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85295500 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0147000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d178c r4:850d1400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850d178c r4:84741d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428ec00 r8:84741dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741d80 r8:8027ed34 r7:df969e60 r6:845a6b00 r5:8428ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84744dc0 INFO: task kworker/1:9:3134 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d03f1000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3135 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:8428b000 r4:8428b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b940 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515378c r4:85153400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515378c r4:84741e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428b000 r8:84741e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741e00 r8:8027ed34 r7:dfa3de60 r6:84741e80 r5:8428b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84744dc0 INFO: task kworker/1:10:3135 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d0569000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3136 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:84525400 r4:84525400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84525400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aad80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84525400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e9000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524ef8c r4:8524ec00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524ef8c r4:84741f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84525400 r8:84741f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741f00 r8:8027ed34 r7:dfa3de60 r6:84741f80 r5:84525400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84744dc0 INFO: task kworker/1:11:3136 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d0a36000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3137 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:df9f9d84 r8:00000002 r7:60000013 r6:df9f9d8c r5:84522400 r4:84522400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84522400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d1440 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84522400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525c78c r4:8525c400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525c78c r4:84741980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84522400 r8:847419ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741980 r8:8027ed34 r7:df9ede60 r6:84741900 r5:84522400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84744dc0 INFO: task kworker/1:12:3137 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d0d1b000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3138 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa4dd84 r8:00000002 r7:60000013 r6:dfa4dd8c r5:84523000 r4:84523000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84523000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6ffc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84523000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fdf8c r4:858fdc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858fdf8c r4:84741880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84523000 r8:847418ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741880 r8:8027ed34 r7:df9f9e60 r6:84741800 r5:84523000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84744dc0 INFO: task kworker/1:13:3138 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d0f32000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa55d84 r8:00000002 r7:60000013 r6:dfa55d8c r5:84291800 r4:84291800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84291800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6fc00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84291800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb29d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fd38c r4:858fd000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858fd38c r4:84741780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84291800 r8:847417ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84741780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84741780 r8:8027ed34 r7:dfa4de60 r6:84741700 r5:84291800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c87c0 INFO: task kworker/1:14:3140 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d133c000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3142 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa2dd84 r8:00000002 r7:60000013 r6:dfa2dd8c r5:8428bc00 r4:8428bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6edc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8428bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849b4f8c r4:849b4c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849b4f8c r4:845a6b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428bc00 r8:845a6bac r7:82804d40 r6:dddced40 r5:dddced60 r4:845a6b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845a6b80 r8:8027ed34 r7:df9b9e60 r6:845a6d80 r5:8428bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8473e7c0 INFO: task kworker/0:7:3142 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d15a0000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3144 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:84289800 r4:84289800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84289800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b934c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84289800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea971000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85462f8c r4:85462c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85462f8c r4:846bbe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84289800 r8:846bbeac r7:82804d40 r6:dddced40 r5:dddced60 r4:846bbe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bbe80 r8:8027ed34 r7:dfa2de60 r6:846bb680 r5:84289800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8473e9c0 INFO: task kworker/0:8:3144 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d15a0000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:8428e000 r4:8428e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8d100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8428e000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa49000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d8b8c r4:853d8800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853d8b8c r4:84733000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428e000 r8:8473302c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733000 r8:8027ed34 r7:dfa2de60 r6:84733080 r5:8428e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4280 INFO: task kworker/0:9:3146 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d15a0000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:8428d400 r4:8428d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85592340 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8428d400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb695000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849b5f8c r4:849b5c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849b5f8c r4:84733100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428d400 r8:8473312c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733100 r8:8027ed34 r7:dfa69e60 r6:84733180 r5:8428d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4200 INFO: task kworker/0:10:3148 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d1973000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3149 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:8428c800 r4:8428c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475ae80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8428c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550e38c r4:8550e000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550e38c r4:84733200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428c800 r8:8473322c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733200 r8:8027ed34 r7:dfa71e60 r6:84733280 r5:8428c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4200 INFO: task kworker/0:11:3149 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d1dcc000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3152 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:8325a400 r4:8325a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8325a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dd040 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8325a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bb000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853db38c r4:853db000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853db38c r4:84733300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8325a400 r8:8473332c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733300 r8:8027ed34 r7:dfa71e60 r6:84741680 r5:8325a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4540 INFO: task kworker/0:12:3152 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d1dcc000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3154 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:84292400 r4:84292400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84292400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528a4c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84292400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849b678c r4:849b6400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849b678c r4:84733380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84292400 r8:847333ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733380 r8:8027ed34 r7:dfa71e60 r6:84741600 r5:84292400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c46c0 INFO: task kworker/0:13:3154 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d2386000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3156 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83c6d400 r4:83c6d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c6d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b24c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab7000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f038c r4:857f0000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857f038c r4:84733400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c6d400 r8:8473342c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733400 r8:8027ed34 r7:dfa9de60 r6:84741480 r5:83c6d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4880 INFO: task kworker/0:14:3156 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d2882000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3157 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:83c6ec00 r4:83c6ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c6ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8527e240 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564ef8c r4:8564ec00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564ef8c r4:84733480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c6ec00 r8:847334ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733480 r8:8027ed34 r7:dfab1e60 r6:84741580 r5:83c6ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4880 INFO: task kworker/0:15:3157 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d2882000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3159 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83c69800 r4:83c69800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c69800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3040 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c69800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba89000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849b6b8c r4:849b6800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849b6b8c r4:84733500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c69800 r8:8473352c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733500 r8:8027ed34 r7:dfab1e60 r6:84741500 r5:83c69800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4a00 INFO: task kworker/0:16:3159 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d2bdd000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3162 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:83c6bc00 r4:83c6bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c6bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559ccc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c6bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b9000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c838c r4:851c8000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851c838c r4:84733580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c6bc00 r8:847335ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733580 r8:8027ed34 r7:dfab1e60 r6:84741400 r5:83c6bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4ac0 INFO: task kworker/0:17:3162 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d2bdd000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83c68c00 r4:83c68c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c68c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa400 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83c68c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c878c r4:851c8400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851c878c r4:84733600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c68c00 r8:8473362c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733600 r8:8027ed34 r7:dfab1e60 r6:84741380 r5:83c68c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4c00 INFO: task kworker/0:18:3163 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d2f5f000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3165 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:833abc00 r4:833abc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833abc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717300 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb855000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571238c r4:85712000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8571238c r4:84733680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833abc00 r8:847336ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733680 r8:8027ed34 r7:dfab1e60 r6:84741300 r5:833abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844c4d00 INFO: task kworker/0:19:3165 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d3111000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84296c00 r4:84296c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84296c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749340 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84296c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbff000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849b7b8c r4:849b7800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849b7b8c r4:84733700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84296c00 r8:8473372c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733700 r8:8027ed34 r7:dfab1e60 r6:84741000 r5:84296c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c8980 INFO: task kworker/0:20:3167 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d3660000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3169 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:839c9800 r4:839c9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839c9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8cc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:839c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ef000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849b7f8c r4:849b7c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849b7f8c r4:84733780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c9800 r8:847337ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733780 r8:8027ed34 r7:dfab1e60 r6:84741280 r5:839c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c8980 INFO: task kworker/0:21:3169 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d3660000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:8406a400 r4:8406a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8406a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6c700 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8406a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb07000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584f38c r4:8584f000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8584f38c r4:84733800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8406a400 r8:8473382c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733800 r8:8027ed34 r7:dfab1e60 r6:84741100 r5:8406a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b60c0 INFO: task kworker/0:22:3171 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d3bab000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:84069800 r4:84069800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84069800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85604ec0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84069800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584c78c r4:8584c400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8584c78c r4:84733880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84069800 r8:847338ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733880 r8:8027ed34 r7:dfb15e60 r6:84741200 r5:84069800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6180 INFO: task kworker/0:23:3173 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d3e19000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb39d84 r8:00000002 r7:60000013 r6:dfb39d8c r5:8406b000 r4:8406b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8406b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a6ec0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8406b000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f138c r4:858f1000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858f138c r4:84733900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8406b000 r8:8473392c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733900 r8:8027ed34 r7:dfb15e60 r6:84741180 r5:8406b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6240 INFO: task kworker/0:24:3175 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d3e19000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:83ac4800 r4:83ac4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ac4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9e5c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb671000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584eb8c r4:8584e800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8584eb8c r4:84733980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac4800 r8:847339ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733980 r8:8027ed34 r7:dfb15e60 r6:84741080 r5:83ac4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6340 INFO: task kworker/0:25:3177 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d41fa000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83ac1800 r4:83ac1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ac1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ea40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f569000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4a7000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849be78c r4:849be400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849be78c r4:84733a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac1800 r8:84733a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733a00 r8:8027ed34 r7:dfb15e60 r6:8411ed00 r5:83ac1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6500 INFO: task kworker/0:26:3179 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d41fa000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:84a80c00 r4:84a80c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a80c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85998300 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a80c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec761000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584ff8c r4:8584fc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8584ff8c r4:84733a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80c00 r8:84733aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733a80 r8:8027ed34 r7:dfb4de60 r6:8411ed80 r5:84a80c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6640 INFO: task kworker/0:27:3181 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d4567000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:84a80000 r4:84a80000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a80000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85998900 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a80000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd8d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849b9b8c r4:849b9800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849b9b8c r4:84733b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80000 r8:84733b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733b00 r8:8027ed34 r7:dfb4de60 r6:83b35700 r5:84a80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6a00 INFO: task kworker/0:28:3183 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d4567000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:84a81800 r4:84a81800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a81800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859cb4c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a81800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe05000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849b9f8c r4:849b9c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849b9f8c r4:84733b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a81800 r8:84733bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733b80 r8:8027ed34 r7:dfb4de60 r6:841a7980 r5:84a81800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6900 INFO: task kworker/0:29:3185 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d4903000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:84a83c00 r4:84a83c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a83c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d3c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1db000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf67000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f7b8c r4:859f7800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859f7b8c r4:84733c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a83c00 r8:84733c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733c00 r8:8027ed34 r7:dfb4de60 r6:841a7900 r5:84a83c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6980 INFO: task kworker/0:30:3187 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d4c05000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:84a84800 r4:84a84800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a84800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a5f40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a84800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ba78c r4:849ba400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ba78c r4:84733d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a84800 r8:84733d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733d00 r8:8027ed34 r7:dfb4de60 r6:83927f00 r5:84a84800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6c00 INFO: task kworker/0:31:3189 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d4c05000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:84a85400 r4:84a85400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a85400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85609380 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a85400 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae85000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597138c r4:85971000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597138c r4:84733d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a85400 r8:84733dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733d80 r8:8027ed34 r7:dfb4de60 r6:83927d80 r5:84a85400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6e00 INFO: task kworker/0:32:3191 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d4ffc000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:84a82400 r4:84a82400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a82400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8800 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a82400 r7:00000000 r6:83018000 r5:00001000 r4:7f21d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc9b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d2b8c r4:858d2800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858d2b8c r4:84733e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a82400 r8:84733e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733e00 r8:8027ed34 r7:dfb4de60 r6:83927d00 r5:84a82400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b6ec0 INFO: task kworker/0:33:3194 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d4ffc000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:84a83000 r4:84a83000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a83000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9fe40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a83000 r7:00000000 r6:83018000 r5:00001000 r4:7f2cb000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceb9000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85971b8c r4:85971800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85971b8c r4:84733e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a83000 r8:84733eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84733e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733e80 r8:8027ed34 r7:dfb4de60 r6:8336b980 r5:84a83000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83933580 INFO: task kworker/0:34:3196 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d5296000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:8428a400 r4:8428a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bb380 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8428a400 r7:00000000 r6:83018000 r5:00001000 r4:7f56b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849be38c r4:849be000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849be38c r4:84733f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428a400 r8:84733f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84733f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84733f00 r8:8027ed34 r7:dfb4de60 r6:84733f80 r5:8428a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c140 INFO: task kworker/0:35:3198 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d5296000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:842c4800 r4:842c4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:842c4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2a980 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f563000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed479000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bf38c r4:849bf000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849bf38c r4:84b4b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c4800 r8:84b4b02c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b000 r8:8027ed34 r7:dfb4de60 r6:84b4b080 r5:842c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c180 INFO: task kworker/0:36:3201 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d55b7000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbc1d84 r8:00000002 r7:60000013 r6:dfbc1d8c r5:8330e000 r4:8330e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8330e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2a600 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8330e000 r7:00000000 r6:83018000 r5:00001000 r4:7f567000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed499000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849beb8c r4:849be800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849beb8c r4:84b4b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330e000 r8:84b4b12c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b100 r8:8027ed34 r7:dfbbde60 r6:84b4b180 r5:8330e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c2c0 INFO: task kworker/0:37:3203 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d55b7000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3204 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:8330d400 r4:8330d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8330d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2a740 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8330d400 r7:00000000 r6:83018000 r5:00001000 r4:7f565000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed489000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bef8c r4:849bec00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849bef8c r4:84b4b200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330d400 r8:84b4b22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b200 r8:8027ed34 r7:dfbbde60 r6:84b4b280 r5:8330d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c2c0 INFO: task kworker/0:38:3204 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d5a59000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83308c00 r4:83308c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83308c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2ae80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83308c00 r7:00000000 r6:83018000 r5:00001000 r4:7f561000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece93000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bf78c r4:849bf400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849bf78c r4:84b4b300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308c00 r8:84b4b32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b300 r8:8027ed34 r7:dfbbde60 r6:84b4b380 r5:83308c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c640 INFO: task kworker/0:39:3207 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d5c56000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:83309800 r4:83309800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83309800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2a180 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83309800 r7:00000000 r6:83018000 r5:00001000 r4:7f531000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed43f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5678c r4:85a56400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5678c r4:84b4b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83309800 r8:84b4b42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b400 r8:8027ed34 r7:dfbcde60 r6:84b4b480 r5:83309800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c700 INFO: task kworker/0:40:3209 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d5c56000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:8330bc00 r4:8330bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8330bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2a280 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8330bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f539000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed475000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bfb8c r4:849bf800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849bfb8c r4:84b4b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330bc00 r8:84b4b52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b500 r8:8027ed34 r7:dfbd1e60 r6:84b4b580 r5:8330bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c840 INFO: task kworker/0:41:3211 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d5f46000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:8330ec00 r4:8330ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8330ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bb840 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8330ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f48f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597378c r4:85973400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597378c r4:84b4b600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330ec00 r8:84b4b62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b600 r8:8027ed34 r7:dfbd5e60 r6:84b4b680 r5:8330ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4cb40 INFO: task kworker/0:42:3213 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d618a000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3215 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:8330c800 r4:8330c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8330c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4c900 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8330c800 r7:00000000 r6:83018000 r5:00001000 r4:7f449000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed48d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85972f8c r4:85972c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85972f8c r4:84b4b700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330c800 r8:84b4b72c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b700 r8:8027ed34 r7:dfbdde60 r6:84b4b780 r5:8330c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c840 INFO: task kworker/0:43:3215 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d64b6000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3216 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:8330a400 r4:8330a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8330a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4c740 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8330a400 r7:00000000 r6:83018000 r5:00001000 r4:7f42f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed449000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85972b8c r4:85972800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85972b8c r4:84b4b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330a400 r8:84b4b82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b800 r8:8027ed34 r7:dfbe9e60 r6:84b4b880 r5:8330a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c840 INFO: task kworker/0:44:3216 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d65cb000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3218 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:838b6000 r4:838b6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4c600 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f3eb000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc9000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597238c r4:85972000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597238c r4:84b4b900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b6000 r8:84b4b92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4b900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4b900 r8:8027ed34 r7:dfbe9e60 r6:84b4b980 r5:838b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e080 INFO: task kworker/0:45:3218 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d65cb000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3221 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:838b1800 r4:838b1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4cc80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f3d9000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec963000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85971f8c r4:85971c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85971f8c r4:84b4ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b1800 r8:84b4ba2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4ba00 r8:8027ed34 r7:dfbe9e60 r6:84b4ba80 r5:838b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e180 INFO: task kworker/0:46:3221 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d6b94000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3223 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:838b2400 r4:838b2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4c400 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f3fd000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c7000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597278c r4:85972400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597278c r4:84b4bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b2400 r8:84b4bb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4bb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4bb00 r8:8027ed34 r7:dfbe9e60 r6:84b4bb80 r5:838b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e340 INFO: task kworker/0:47:3223 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d6b94000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3225 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:838b5400 r4:838b5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859bb740 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f48d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2b3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597338c r4:85973000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597338c r4:84b4bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b5400 r8:84b4bc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4bc00 r8:8027ed34 r7:dfbe9e60 r6:84b4bc80 r5:838b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e400 INFO: task kworker/0:48:3225 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d717e000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3227 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:838b3c00 r4:838b3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2a080 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f52b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed391000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85973f8c r4:85973c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85973f8c r4:84b4bd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b3c00 r8:84b4bd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4bd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4bd00 r8:8027ed34 r7:dfc19e60 r6:84b4bd80 r5:838b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e540 INFO: task kworker/0:49:3227 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d717e000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3229 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84b08000 r4:84b08000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b08000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85950600 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b08000 r7:00000000 r6:83018000 r5:00001000 r4:7f4e3000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4e3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85973b8c r4:85973800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85973b8c r4:84b4be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b08000 r8:84b4be2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4be00 r8:8027ed34 r7:dfc25e60 r6:84b4be80 r5:84b08000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e6c0 INFO: task kworker/0:50:3229 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d7d60000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3231 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:84b08c00 r4:84b08c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b08c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2afc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4e3000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc1b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bff8c r4:849bfc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849bff8c r4:84b4bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b08c00 r8:84b4bf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4bf00 r8:8027ed34 r7:dfc25e60 r6:84b4bf80 r5:84b08c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e980 INFO: task kworker/0:51:3231 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d7d60000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3232 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84b0a400 r4:84b0a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b0a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559b780 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f611000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed21f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849c438c r4:849c4000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849c438c r4:84b68000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b0a400 r8:84b6802c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b68000 r8:8027ed34 r7:dfc2de60 r6:84b68080 r5:84b0a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5eac0 INFO: task kworker/0:52:3232 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d7d60000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3236 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:84b0b000 r4:84b0b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b0b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84773c00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590138c r4:85901000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8590138c r4:832a1180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b0b000 r8:832a11ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1180 r8:8027ed34 r7:dfa4de60 r6:84b68100 r5:84b0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763200 INFO: task kworker/1:15:3236 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d81c7000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3238 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84b0c800 r4:84b0c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b0c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9d60: 800f0013 ffffffff r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 Not tainted 6.15.0-syzkaller #0 r5:84b0d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84773040 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf9000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fe78c r4:858fe400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858fe78c r4:832a1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b0d400 r8:832a112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1100 r8:8027ed34 r7:dfc61e60 r6:84b68300 r5:84b0d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763600 INFO: task kworker/1:16:3240 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d60: 800f0013 ffffffff r4:e0679dc0 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:54:3241 blocked for more than 452 seconds. Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578b600 r5:849c5f8c r4:849c5c00 r4:84b68280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfc51fb0 to 0xdfc51ff8) Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3246 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc91d84 r8:00000002 r7:60000113 r6:dfc91d8c r5:838b6c00 r4:838b6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b580 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6a1000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc73000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849c678c r4:849c6400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849c678c r4:84b68480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b6c00 r8:84b684ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b68480 r8:8027ed34 r7:dfc75e60 r6:8424e480 r5:838b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc91fb0 to 0xdfc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6b240 INFO: task kworker/0:56:3246 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d60: 800f0013 ffffffff [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3247 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfc9dd84 r8:00000002 r7:60000113 r6:dfc9dd8c r5:84a86c00 r4:84a86c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a86c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84773b00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec76d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85900f8c r4:85900c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b70000 r8:8027ed34 r7:dfc61e60 r6:84b70080 r5:84a86c00 r4:84b5ec40 r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:00001000 r4:ecc3d000 r10:61c88647 r9:84a86000 r8:84b6852c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: d94f0000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:dfadd000 r4:85066f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b2f80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f699000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc5f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849c6f8c r4:849c6c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849c6f8c r4:84b68580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844f8c00 r8:84b685ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b68580 r8:8027ed34 r7:dfca1e60 r6:84b70180 r5:844f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6b800 INFO: task kworker/0:58:3251 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: d9c18000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b2580 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f695000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849c778c r4:849c7400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849c778c r4:84b68600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fa400 r8:84b6862c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b68600 r8:8027ed34 r7:dfca1e60 r6:84b70200 r5:844fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6b780 INFO: task kworker/0:59:3253 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: d9c18000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:61c88647 r9:844f8000 r8:84b686ac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b68700 r8:8027ed34 r7:dfca1e60 r6:84b68780 r5:84b0ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: d9f69000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 r4:e0679dc0 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:62:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcc9d84 r8:00000002 r7:60000013 r6:dfcc9d8c r5:84b09800 r4:84b09800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b09800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b2500 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b09800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb861000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6778c r4:85b67400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b6778c r4:84b68800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b09800 r8:84b6882c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b68800 r8:8027ed34 r7:dfca1e60 r6:84b68880 r5:84b09800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6be80 INFO: task kworker/0:62:3258 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:63:3261 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcd5d84 r8:00000002 r7:60000013 r6:dfcd5d8c r5:84b0bc00 r4:84b0bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b0bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b2900 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f68f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc31000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849c638c r4:849c6000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849c638c r4:84b68900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b0bc00 r8:84b6892c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b68900 r8:8027ed34 r7:dfca1e60 r6:84b68980 r5:84b0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6be00 INFO: task kworker/0:63:3261 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:dfc7dd84 r8:00000002 r7:60000113 r6:dfc7dd8c r5:84820000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: da255000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 Exception stack(0xe0679fb0 to 0xe0679ff8) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:ecddd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c4db8c r4:85c4d800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c4db8c r4:84b68b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84822400 r8:84b68b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfce9fb0 to 0xdfce9ff8) task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:849c6b8c r4:84b68c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 r4:00000000 [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:67 state:D stack:0 pid:3269 tgid:3269 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b2c40 r7:dddced40 r6:83018000 r5:85b67f8c r4:84b68d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84823c00 r8:84b68d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b68d00 r8:8027ed34 r7:dfce9e60 r6:84b68d80 r5:84823c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7b180 INFO: task kworker/0:67:3269 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: dae41000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 Not tainted 6.15.0-syzkaller #0 r5:84824800 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) r4:84b7b940 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85066f80 Exception stack(0xe0679fb0 to 0xe0679ff8) Not tainted 6.15.0-syzkaller #0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85599e80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84825400 r7:00000000 r6:83018000 r5:00001000 r4:7f7cf000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3cb000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859ccf8c r4:859ccc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859ccf8c r4:84b68f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84825400 r8:84b68f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b68f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b68f00 r8:8027ed34 r7:dfce9e60 r6:84b68f80 r5:84825400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7b7c0 INFO: task kworker/0:69:3274 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: db65b000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84826000 r4:82918640 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cef8c r4:859cec00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859cef8c r4:84b82000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84826000 r8:84b8202c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b82000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b82000 r8:8027ed34 r7:dfaa9e60 r6:84b82080 r5:84826000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7b8c0 INFO: task kworker/0:70:3276 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 Exception stack(0xe0679d20 to 0xe0679d68) 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84826c00 r4:82918640 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7bdc0 INFO: task kworker/0:71:3279 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: dbc2d000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:72 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84821800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bf600 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84821800 r7:00000000 r6:83018000 r5:00001000 r4:7f849000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84821800 r8:84b8222c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0679d20 to 0xe0679d68) r4:e0679dc0 r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r4:85066f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84820c00 r4:82918640 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85581000 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84820c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8ed000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed76d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cfc38c r4:85cfc000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cfc38c r4:84b82300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84820c00 r8:84b8232c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b82300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b82300 r8:8027ed34 r7:dfacde60 r6:84b82380 r5:84820c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8a080 INFO: task kworker/0:73:3283 is blocked on a mutex likely owned by task kworker/0:225:3817. Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:e0679dc0 r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:84828000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85cfeb8c r4:85cfe800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0679d20 to 0xe0679d68) r4:e0679dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3287 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84828c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ba900 r7:dddced40 r6:83018000 r5:849cf78c r4:84b82500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84828c00 r8:84b8252c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b82500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b82500 r8:8027ed34 r7:dfb05e60 r6:84b82580 r5:84828c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8a200 INFO: task kworker/0:75:3287 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: dc55e000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:8503d38c r4:8503d000 r4:85066f80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:76 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84829800 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:e0679dc0 r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r4:85066f80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:77 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8482a400 r4:82918640 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ba800 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482a400 r7:00000000 r6:83018000 r5:00001000 r4:7f9ed000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaf1000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cfb8c r4:849cf800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cfb8c r4:84b82700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482a400 r8:84b8272c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b82700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b82700 r8:8027ed34 r7:dfb21e60 r6:84b82780 r5:8482a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8a7c0 INFO: task kworker/0:77:3291 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: dd02b000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:8482b000 r5:8482b000 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482b000 r7:00000000 r6:83018000 r5:00001000 r4:7f9ad000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed387000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cff8c r4:849cfc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cff8c r4:84b82800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482b000 r8:84b8282c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b82800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b82800 r8:8027ed34 r7:dfb21e60 r6:84b82880 r5:8482b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r5:00001000 r4:dfadd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8482bc00 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: dd02b000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:3297 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:8482d400 r4:8482d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b99800 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482d400 r7:00000000 r6:83018000 r5:00001000 r4:7f9a5000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1cf000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849dc78c r4:849dc400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849dc78c r4:84b82a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84b82a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b82a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfb75fb0 to 0xdfb75ff8) task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0679dc0 r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:3298 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3298 tgid:3298 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8482e000 r5:8482e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849dc38c r4:849dc000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849dc38c r4:84b82b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482e000 r8:84b82b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b82b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b82b00 r8:8027ed34 r7:dfb75e60 r6:84b82b80 r5:8482e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8aa80 INFO: task kworker/0:81:3298 is blocked on a mutex likely owned by task kworker/0:225:3817. Exception stack(0xe0679d20 to 0xe0679d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r4:85066f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:82 state:D stack:0 pid:3299 tgid:3299 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8482ec00 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b82c00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:3302 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:84880000 r4:84880000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84880000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfcfdfb0 to 0xdfcfdff8) INFO: task kworker/0:83:3302 is blocked on a mutex likely owned by task kworker/0:225:3817. [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:8503d38c r4:8503d000 r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 INFO: task kworker/0:84:3303 blocked for more than 452 seconds. r5:84882400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b82e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b82e00 r8:8027ed34 r7:dfcfde60 r6:84b82e80 r5:84882400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b99080 INFO: task kworker/0:84:3303 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: dda69000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:85:3305 blocked for more than 452 seconds. r10:82918644 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:84883000 r5:84883000 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0679dc0 r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r4:85066f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84881800 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b9b000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9b000 r8:8027ed34 r7:dfd01e60 r6:84b9b080 r5:84881800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b991c0 INFO: task kworker/0:86:3307 is blocked on a mutex likely owned by task kworker/0:225:3817. task:kworker/0:225 state:R running task stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a75400 r8:80200be4 r7:e0679d54 r6:ffffffff r5:84a75400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0679d20 to 0xe0679d68) 9d20: de35a000 ece27000 00000001 80239bb8 7f16f000 00000001 82ac11c4 82ac05a0 9d40: 7f16f000 ece27000 8280c9b4 e0679d9c e0679da0 e0679d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0679dc0 r5:e0679e08 r4:e0679dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084100 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d38c r4:8503d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503d38c r4:85066f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:85066fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85066f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85066f80 r8:8027ed34 r7:e0685e60 r6:8508b000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:3310 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:3310 tgid:3310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__sch <> 3380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:7378 blocked for more than 477 seconds. r5:85870c00 r4:82918640 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc19e08 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9d60: 800e0013 ffffffff r5:8501a38c r4:8501a000 INFO: task kworker/0:692:7379 blocked for more than 477 seconds. r10:82918644 r9:edc15d84 r8:00000002 r7:60000113 r6:edc15d8c r5:85872400 r4:85872400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85872400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b9c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85872400 r7:00000000 r6:83018000 r5:00001000 r4:7f667000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9cf000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5778c r4:85b57400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5778c r4:85620280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85872400 r8:856202ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85620280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620280 r8:8027ed34 r7:edc09e60 r6:85620300 r5:85872400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc15fb0 to 0xedc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b5c0 INFO: task kworker/0:692:7379 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06a9d20 to 0xe06a9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85bfa400 r7:00000000 r6:83018000 r5:00001000 r4:7f665000 [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85bfa400 r8:856203ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b980 INFO: task kworker/0:693:7381 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: bd01b000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85bfd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b57b8c r4:85b57800 r10:61c88647 r9:85bfd400 r8:8562042c r7:82804d40 r6:dddced40 r5:dddced60 r4:85620400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620400 r8:8027ed34 r7:edc15e60 r6:85588f00 r5:85bfd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc31fb0 to 0xedc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b900 INFO: task kworker/0:694:7384 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: bd01b000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:7385 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:7385 tgid:7385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc35d84 r8:00000002 r7:60000013 r6:edc35d8c r5:85bfbc00 r4:85bfbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85bfbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bc40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bfbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f66b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9fd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b57f8c r4:85b57c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b57f8c r4:85620480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bfbc00 r8:856204ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85620480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620480 r8:8027ed34 r7:edc31e60 r6:85588f80 r5:85bfbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc35fb0 to 0xedc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511b900 INFO: task kworker/0:695:7385 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: bd01b000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:696:7387 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:696 state:D stack:0 pid:7387 tgid:7387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc3dd84 r8:00000002 r7:60000113 r6:edc3dd8c r5:85bfe000 r4:85bfe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85bfe000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76040 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bfe000 r7:00000000 r6:83018000 r5:00001000 r4:7f671000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda59000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5cb8c r4:85b5c800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5cb8c r4:85620500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bfe000 r8:8562052c r7:82804d40 r6:dddced40 r5:dddced60 r4:85620500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620500 r8:8027ed34 r7:edc35e60 r6:85a74000 r5:85bfe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc3dfb0 to 0xedc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511ba40 INFO: task kworker/0:696:7387 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: bdb88000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:7388 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:7388 tgid:7388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc41d84 r8:00000002 r7:60000013 r6:edc41d8c r5:85bfc800 r4:85bfc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85bfc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bd00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bfc800 r7:00000000 r6:83018000 r5:00001000 r4:7f66d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda11000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c38c r4:85b5c000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5c38c r4:85620580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bfc800 r8:856205ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85620580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620580 r8:8027ed34 r7:edc3de60 r6:85a74080 r5:85bfc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc41fb0 to 0xedc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511ba40 INFO: task kworker/0:697:7388 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: bdb88000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:7390 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:7390 tgid:7390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc49d84 r8:00000002 r7:60000013 r6:edc49d8c r5:85bfb000 r4:85bfb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85bfb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847660c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bfb000 r7:00000000 r6:83018000 r5:00001000 r4:7f66f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda41000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c78c r4:85b5c400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5c78c r4:85620600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bfb000 r8:8562062c r7:82804d40 r6:dddced40 r5:dddced60 r4:85620600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620600 r8:8027ed34 r7:edc3de60 r6:85a74100 r5:85bfb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc49fb0 to 0xedc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511be80 INFO: task kworker/0:698:7390 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: bdb88000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:7393 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:699 state:D stack:0 pid:7393 tgid:7393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc4dd84 r8:00000002 r7:60000113 r6:edc4dd8c r5:85bfec00 r4:85bfec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85bfec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76200 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bfec00 r7:00000000 r6:83018000 r5:00001000 r4:7f673000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5cf8c r4:85b5cc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5cf8c r4:85620680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bfec00 r8:856206ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85620680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620680 r8:8027ed34 r7:edc3de60 r6:85a74180 r5:85bfec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc4dfb0 to 0xedc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a76100 INFO: task kworker/0:699:7393 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: be003000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:700:7395 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:700 state:D stack:0 pid:7395 tgid:7395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc51d84 r8:00000002 r7:60000113 r6:edc51d8c r5:85a22400 r4:85a22400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a22400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a762c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a22400 r7:00000000 r6:83018000 r5:00001000 r4:7f675000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edacd000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5d38c r4:85b5d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5d38c r4:85620700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a22400 r8:8562072c r7:82804d40 r6:dddced40 r5:dddced60 r4:85620700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620700 r8:8027ed34 r7:edc4de60 r6:85a74200 r5:85a22400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc51fb0 to 0xedc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a76080 INFO: task kworker/0:700:7395 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: be482000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:701:7397 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:7397 tgid:7397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc55d84 r8:00000002 r7:60000013 r6:edc55d8c r5:85a18c00 r4:85a18c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a18c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76400 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f677000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edad9000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5d78c r4:85b5d400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5d78c r4:85620780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a18c00 r8:856207ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85620780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620780 r8:8027ed34 r7:edc51e60 r6:85a74280 r5:85a18c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc55fb0 to 0xedc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a760c0 INFO: task kworker/0:701:7397 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:702 state:D stack:0 pid:7399 tgid:7399 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85810000 r4:82918640 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc45fb0 to 0xedc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a76440 INFO: task kworker/0:702:7399 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: beb24000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:85812400 r5:85812400 r4:82918640 [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5db8c r4:85b5d800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5db8c r4:85620900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85812400 r8:8562092c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r4:85093380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918644 r9:edc5dd84 r8:00000002 r7:60000113 r6:edc5dd8c r5:85813000 r4:85813000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85813000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76b40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85813000 r7:00000000 r6:83018000 r5:00001000 r4:7f67f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb15000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5e38c r4:85b5e000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5e38c r4:85620a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85813000 r8:85620a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85620a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620a00 r8:8027ed34 r7:edc45e60 r6:85620a80 r5:85813000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e06a9dc0 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc61d84 r8:00000002 r7:60000113 r6:edc61d8c r5:85813c00 r4:85813c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85813c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76c00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85813c00 r7:00000000 r6:83018000 r5:00001000 r4:7f681000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85813c00 r8:85620b2c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: bee3c000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r5:8501a38c r4:8501a000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918644 r9:edc65d84 r8:00000002 r7:60000113 r6:edc65d8c r5:85811800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85b5eb8c r4:85b5e800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:707:7410 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:707 state:D stack:0 pid:7410 tgid:7410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edb65d84 r8:00000002 r7:60000113 r6:edb65d8c r5:85814800 r4:85814800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85814800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bd40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85814800 r7:00000000 r6:83018000 r5:00001000 r4:7f685000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb3d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ef8c r4:85b5ec00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5ef8c r4:85620d00 r10:00000000 r9:85620d00 r8:8027ed34 r7:edc65e60 r6:85620d80 r5:85814800 INFO: task kworker/0:707:7410 is blocked on a mutex likely owned by task kworker/1:134:3830. [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:708 state:D stack:0 pid:7412 tgid:7412 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85816000 r4:82918640 r4:00000000 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 INFO: task kworker/0:709:7415 blocked for more than 477 seconds. task:kworker/0:709 state:D stack:0 pid:7415 tgid:7415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc6dd84 r8:00000002 r7:60000113 r6:edc6dd8c r5:85815400 r4:85815400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85815400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7f240 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85815400 r7:00000000 r6:83018000 r5:00001000 r4:7f689000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc79000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5f78c r4:85b5f400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5f78c r4:85620f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85815400 r8:85620f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85620f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85620f00 r8:8027ed34 r7:edc71e60 r6:85620f80 r5:85815400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc6dfb0 to 0xedc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f040 INFO: task kworker/0:709:7415 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: bf545000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 Exception stack(0xe06a9fb0 to 0xe06a9ff8) INFO: task kworker/0:710:7416 blocked for more than 477 seconds. r5:85871800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc85e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7f540 r7:dddced40 r6:83018000 r5:85b5fb8c r4:85af7000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d20: bf545000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r5:8501a38c r4:8501a000 r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:7418 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:711 state:D stack:0 pid:7418 tgid:7418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edc81d84 r8:00000002 r7:60000113 r6:edc81d8c r5:85810c00 r4:85810c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85810c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7f5c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f68d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc8d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ff8c r4:85b5fc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5ff8c r4:85af7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85810c00 r8:85af712c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af7100 r8:8027ed34 r7:edc85e60 r6:85af7180 r5:85810c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc81fb0 to 0xedc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:711:7418 is blocked on a mutex likely owned by task kworker/1:134:3830. 9d60: 800e0013 ffffffff r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe06a9fb0 to 0xe06a9ff8) r4:8508f600 Workqueue: events bpf_prog_free_deferred r5:85816c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85af7200 r8:8027ed34 r7:edc81e60 r6:85af7280 r5:85816c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc95fb0 to 0xedc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7f680 INFO: task kworker/0:712:7421 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c01f7000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:713:7422 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:713 state:D stack:0 pid:7422 tgid:7422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85a14800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85b6478c r4:85af7300 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800e0013 ffffffff r4:e06a9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:7425 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:7425 tgid:7425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edca9d84 r8:00000002 r7:60000113 r6:edca9d8c r5:84b30000 r4:84b30000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b30000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edca9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7fe00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b30000 r7:00000000 r6:83018000 r5:00001000 r4:7f697000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcbf000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6538c r4:85b65000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b6538c r4:85af7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b30000 r8:85af742c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af7400 r8:8027ed34 r7:edca1e60 r6:85af7480 r5:84b30000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedca9fb0 to 0xedca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7fbc0 Workqueue: events bpf_prog_free_deferred 9d60: 800e0013 ffffffff r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r4:85093380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918644 r9:edcb5d84 r8:00000002 r7:60000113 r6:edcb5d8c r5:84b30c00 r5:84b30c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r4:85093380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b31800 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85af7600 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a7fb40 INFO: task kworker/0:716:7428 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c0af9000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:717:7431 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:717 state:D stack:0 pid:7431 tgid:7431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edcbdd84 r8:00000002 r7:60000013 r6:edcbdd8c r5:84b32400 r4:84b32400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b32400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r4:85093380 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84b33000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85b65b8c r4:85af7800 r10:00000000 r9:85af7800 r8:8027ed34 r7:edcbde60 r6:85af7880 r5:84b33000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcd1fb0 to 0xedcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a810c0 INFO: task kworker/0:718:7432 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c1795000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:7434 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:7434 tgid:7434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edce5d84 r8:00000002 r7:60000013 r6:edce5d8c r5:84b35400 r4:84b35400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b35400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edce5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a81700 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b35400 r7:00000000 r6:83018000 r5:00001000 r4:7f6a3000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcfb000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6638c r4:85b66000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b6638c r4:85af7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b35400 r8:85af792c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af7900 r8:8027ed34 r7:edcd1e60 r6:85af7980 r5:84b35400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedce5fb0 to 0xedce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a81240 INFO: task kworker/0:719:7434 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 9d60: 800e0013 ffffffff r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84b33c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:edcf1000 r5:85b65f8c r4:85b65c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b65f8c r4:85af7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b33c00 r8:85af7a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af7a00 r8:8027ed34 r7:edce5e60 r6:85af7a80 r5:84b33c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedce9fb0 to 0xedce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a810c0 INFO: task kworker/0:720:7436 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c1e05000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe06a9fb0 to 0xe06a9ff8) INFO: task kworker/0:721:7440 blocked for more than 477 seconds. r5:84b36000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6678c r4:85b66400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b6678c r4:85af7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b36000 r8:85af7b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af7b00 r8:8027ed34 r7:edce5e60 r6:85af7b80 r5:84b36000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd09fb0 to 0xedd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a81500 INFO: task kworker/0:721:7440 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c1e05000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:858a8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85b66b8c r4:85af7c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:858a9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a81e40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f6a9000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd15000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b66f8c r4:85b66c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b66f8c r4:85af7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a9800 r8:85af7d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af7d00 r8:8027ed34 r7:edd0de60 r6:85af7d80 r5:858a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd19fb0 to 0xedd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a81a80 INFO: task kworker/0:723:7444 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c241d000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:724:7446 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:724 state:D stack:0 pid:7446 tgid:7446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edd21d84 r8:00000002 r7:60000113 r6:edd21d8c r5:858ab000 r4:858ab000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858ab000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eccef000 r10:61c88647 r9:858ab000 r8:85af7e2c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:724:7446 is blocked on a mutex likely owned by task kworker/1:134:3830. 9d60: 800e0013 ffffffff r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r4:85093380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:858abc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfc59000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858abc00 r8:85af7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af7f00 r8:8027ed34 r7:edd21e60 r6:85af7f80 r5:858abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd2dfb0 to 0xedd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a81d00 INFO: task kworker/0:725:7447 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c29ea000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) r4:8508f600 task:kworker/0:726 state:D stack:0 pid:7454 tgid:7454 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85c02400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:7562 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:7562 tgid:7562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecce9d84 r8:00000002 r7:60000013 r6:ecce9d8c r5:85c04800 r4:85c04800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c04800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b040 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c04800 r7:00000000 r6:83018000 r5:00001000 r4:7f6a5000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecccf000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849c578c r4:849c5400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849c578c r4:85af6080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c04800 r8:85af60ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85af6080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af6080 r8:8027ed34 r7:edd21e60 r6:85a74380 r5:85c04800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce9fb0 to 0xecce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b7b340 INFO: task kworker/0:727:7562 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r5:8501a38c r4:8501a000 r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:858a8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b2080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:729:7568 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:729 state:D stack:0 pid:7568 tgid:7568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd01d84 r8:00000002 r7:60000113 r6:ecd01d8c r5:858ad400 r4:858ad400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858ad400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6c000 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f70d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd09000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7478c r4:85b74400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b7478c r4:85af6200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ad400 r8:85af622c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af6200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af6200 r8:8027ed34 r7:edd21e60 r6:85af6280 r5:858ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd01fb0 to 0xecd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:729:7568 is blocked on a mutex likely owned by task kworker/1:134:3830. 9d60: 800e0013 ffffffff r4:e06a9dc0 r4:00000000 r5:8501a38c r4:8501a000 r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 task:kworker/0:730 state:D stack:0 pid:7569 tgid:7569 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6c300 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f70f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd23000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b74b8c r4:85b74800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b74b8c r4:85af6300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858ac800 r8:85af632c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af6300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af6300 r8:8027ed34 r7:ecd01e60 r6:85af6380 r5:858ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd0dfb0 to 0xecd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a6c300 INFO: task kworker/0:730:7569 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c356d000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:731:7571 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:731 state:D stack:0 pid:7571 tgid:7571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd21d84 r8:00000002 r7:60000013 r6:ecd21d8c r5:858ae000 r4:858ae000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858ae000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6c5c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f711000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd29000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85b74f8c r4:85af6400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 800e0013 ffffffff r4:e06a9dc0 r4:00000000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:858aa400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6c800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:733:7575 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:733 state:D stack:0 pid:7575 tgid:7575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecd35d84 r8:00000002 r7:60000013 r6:ecd35d8c r5:858aec00 r4:858aec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858aec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6ca40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f715000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd3d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7578c r4:85b75400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b7578c r4:85af6600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858aec00 r8:85af662c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af6600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af6600 r8:8027ed34 r7:ecd2de60 r6:85af6680 r5:858aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd35fb0 to 0xecd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a6c600 INFO: task kworker/0:733:7575 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:ecd41d84 r8:00000002 r7:60000113 r6:ecd41d8c r5:84b34800 r5:84b34800 r4:82918640 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6cc80 [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a6c840 INFO: task kworker/0:734:7577 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c487d000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:7579 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:735 state:D stack:0 pid:7579 tgid:7579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecda5d84 r8:00000002 r7:60000013 r6:ecda5d8c r5:84b36c00 r4:84b36c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b36c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6bb40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b36c00 r7:00000000 r6:83018000 r5:00001000 r4:7f71b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd63000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85af6800 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800e0013 ffffffff r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:82918644 r9:ecdb9d84 r8:00000002 r7:60000013 r6:ecdb9d8c r5:85178000 r5:85178000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85b75f8c r4:85af6900 r4:85af6900 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb9fb0 to 0xecdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a6ccc0 INFO: task kworker/0:736:7581 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c52fb000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:7583 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:7583 tgid:7583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85178c00 r5:85178c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4c940 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85178c00 r7:00000000 r6:83018000 r5:00001000 r4:7f71f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd8f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b76b8c r4:85b76800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b76b8c r4:85af6a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85178c00 r8:85af6a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af6a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af6a00 r8:8027ed34 r7:ecda5e60 r6:85af6a80 r5:85178c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedce1fb0 to 0xedce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847631c0 INFO: task kworker/0:737:7583 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06a9d20 to 0xe06a9d68) r4:82ac11e4 r4:e06a9dc0 r4:00000000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85093380 Exception stack(0xe06a9fb0 to 0xe06a9ff8) r4:8508f600 Not tainted 6.15.0-syzkaller #0 r10:82918644 r9:ecdd5d84 r8:00000002 r7:60000013 r6:ecdd5d8c r5:85179800 r5:85179800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b7678c r4:85b76400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85179800 r8:85af6b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af6b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af6b00 r8:8027ed34 r7:edce1e60 r6:85af6b80 r5:85179800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd5fb0 to 0xecdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4c340 INFO: task kworker/0:738:7586 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c554d000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Not tainted 6.15.0-syzkaller #0 r4:8517a400 r5:8517a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd1e08 r4:00000000 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8517a400 r8:85af6c2c r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:740:7590 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:740 state:D stack:0 pid:7590 tgid:7590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecdd9d84 r8:00000002 r7:60000013 r6:ecdd9d8c r5:8517b000 r4:8517b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8517b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859500c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8517b000 r7:00000000 r6:83018000 r5:00001000 r4:7f723000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecde3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7738c r4:85b77000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b7738c r4:85af6d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85af6d00 r8:8027ed34 r7:ecdd1e60 r6:85af6d80 r5:8517b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 9d60: 800e0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:00000000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:741:7591 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:741 state:D stack:0 pid:7591 tgid:7591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecde1d84 r8:00000002 r7:60000113 r6:ecde1d8c r5:8517bc00 r4:8517bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8517bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859505c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8517bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb5000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b77b8c r4:85b77800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b77b8c r4:85af6e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517bc00 r8:85af6e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85af6e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af6e00 r8:8027ed34 r7:ecdd9e60 r6:85af6e80 r5:8517bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e06a9dc0 r4:00000000 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:8501a38c r4:8501a000 r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:742:7593 blocked for more than 478 seconds. r10:82918644 r9:eceb5d84 r8:00000002 r7:60000013 r6:eceb5d8c r5:8517d400 r5:8517d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85b7778c r4:85b77400 r10:61c88647 r9:8517d400 r8:85af6f2c r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c630b000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:743:7601 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:743 state:D stack:0 pid:7601 tgid:7601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecec9d84 r8:00000002 r7:60000013 r6:ecec9d8c r5:8517c800 r4:8517c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8517c800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85950c40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8517c800 r7:00000000 r6:83018000 r5:00001000 r4:7f729000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece63000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b77f8c r4:85b77c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b77f8c r4:85bc5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517c800 r8:85bc502c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5000 r8:8027ed34 r7:ecde1e60 r6:85bc5080 r5:8517c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec9fb0 to 0xecec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85950cc0 INFO: task kworker/0:743:7601 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c65fb000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:7602 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:7602 tgid:7602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ece8dd84 r8:00000002 r7:60000013 r6:ece8dd8c r5:8517ec00 r4:8517ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8517ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85950d40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8517ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f72b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece6d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cc38c r4:859cc000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859cc38c r4:85bc5100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517ec00 r8:85bc512c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 r4:e06a9dc0 r4:00000000 r5:00001000 r4:dfb77000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:745 state:D stack:0 pid:7603 tgid:7603 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8517e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85950ec0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8517e000 r7:00000000 r6:83018000 r5:00001000 r4:7f72d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece97000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cc78c r4:859cc400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859cc78c r4:85bc5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517e000 r8:85bc522c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5200 r8:8027ed34 r7:ece8de60 r6:85bc5280 r5:8517e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef1fb0 to 0xecef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85950cc0 INFO: task kworker/0:745:7603 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c6d4f000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:746 state:D stack:0 pid:7604 tgid:7604 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84938000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85950dc0 r7:dddced40 r6:83018000 r5:859ccb8c r4:85bc5300 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06a9d20 to 0xe06a9d68) r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r4:85093380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84938c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:858feb8c r4:858fe800 r7:dddced40 r6:83018000 r5:858feb8c r4:85bc5400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84938c00 r8:85bc542c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5400 r8:8027ed34 r7:ecef5e60 r6:85bc5480 r5:84938c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee5fb0 to 0xecee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85950cc0 INFO: task kworker/0:747:7605 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c6ea6000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:7606 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:7606 tgid:7606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecef9d84 r8:00000002 r7:60000113 r6:ecef9d8c r5:84939800 r4:84939800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84939800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:7608 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:7608 tgid:7608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ecf01d84 r8:00000002 r7:60000113 r6:ecf01d8c r5:8493a400 r4:8493a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493a400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bf700 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493a400 r7:00000000 r6:83018000 r5:00001000 r4:7f84b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed39f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cdb8c r4:859cd800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859cdb8c r4:85bc5600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493a400 r8:85bc562c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5600 r8:8027ed34 r7:ecef9e60 r6:85bc5680 r5:8493a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf01fb0 to 0xecf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85950cc0 INFO: task kworker/0:749:7608 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8493e000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:859cdf8c r4:859cdc00 r4:85bc5700 dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xe06a9d20 to 0xe06a9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe06a9fb0 to 0xe06a9ff8) INFO: task kworker/0:751:7790 blocked for more than 478 seconds. r5:8493ec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed711e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bfb00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f873000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed68d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859ce38c r4:859ce000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859ce38c r4:85bc5800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493ec00 r8:85bc582c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5800 r8:8027ed34 r7:ecef9e60 r6:85bc5880 r5:8493ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed711fb0 to 0xed711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bf780 INFO: task kworker/0:751:7790 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c7e9f000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85093380 Exception stack(0xe06a9fb0 to 0xe06a9ff8) INFO: task kworker/0:752:7810 blocked for more than 478 seconds. r5:8493bc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:859ce78c r4:85bc5900 5fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:8493c800 r5:8493c800 r4:82918640 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bad40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493c800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb51000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ce78c r4:849ce400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ce78c r4:85bc5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493c800 r8:85bc5a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5a00 r8:8027ed34 r7:ecef9e60 r6:85bc5a80 r5:8493c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed71dfb0 to 0xed71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bfd40 INFO: task kworker/0:753:7813 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c81d5000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85093380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:858ba400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 800e0013 ffffffff r4:e06a9dc0 r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r4:85093380 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:755:7902 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:7902 tgid:7902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:eda89d84 r8:00000002 r7:60000113 r6:eda89d8c r5:858bd400 r4:858bd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858bd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bac80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ceb8c r4:849ce800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ceb8c r4:85bc5c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858bd400 r8:85bc5c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5c00 r8:8027ed34 r7:ed71de60 r6:85bc5c80 r5:858bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda89fb0 to 0xeda89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8594a9c0 INFO: task kworker/0:755:7902 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c889c000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 Not tainted 6.15.0-syzkaller #0 r5:858bbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:8031 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:8031 tgid:8031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf49d84 r8:00000002 r7:60000013 r6:edf49d8c r5:858bc800 r4:858bc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858bc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856baec0 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:849ce38c r4:85bc5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858bc800 r8:85bc5d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5d00 r8:8027ed34 r7:edf89e60 r6:85bc5e80 r5:858bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf49fb0 to 0xedf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856baa80 INFO: task kworker/0:757:8031 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c8dfd000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:758:8034 blocked for more than 478 seconds. task:kworker/0:758 state:D stack:0 pid:8034 tgid:8034 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858b8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba5fc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc63000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cd78c r4:849cd400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cd78c r4:85bc5f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858b8000 r8:85bc5f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bc5f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc5f00 r8:8027ed34 r7:edf89e60 r6:85bc5f80 r5:858b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf4dfb0 to 0xedf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ba5c0 INFO: task kworker/0:758:8034 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c8dfd000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:8036 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:8036 tgid:8036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf5dd84 r8:00000002 r7:60000113 r6:edf5dd8c r5:85c05400 r4:85c05400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c05400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ba740 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c05400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cdb8c r4:849cd800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cdb8c r4:85bbf000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c05400 r8:85bbf02c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf000 r8:8027ed34 r7:edf4de60 r6:85a74480 r5:85c05400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf5dfb0 to 0xedf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856baa00 INFO: task kworker/0:759:8036 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c9327000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:760:8038 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:760 state:D stack:0 pid:8038 tgid:8038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf61d84 r8:00000002 r7:60000013 r6:edf61d8c r5:85c06000 r4:85c06000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c06000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7300 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c06000 r7:00000000 r6:83018000 r5:00001000 r4:7f989000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf25000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ccb8c r4:849cc800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ccb8c r4:85bbf080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c06000 r8:85bbf0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf080 r8:8027ed34 r7:edf4de60 r6:85a74500 r5:85c06000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf61fb0 to 0xedf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ba5c0 INFO: task kworker/0:760:8038 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c9327000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:8039 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:8039 tgid:8039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf65d84 r8:00000002 r7:60000113 r6:edf65d8c r5:85c01800 r5:85c01800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7040 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c01800 r7:00000000 r6:83018000 r5:00001000 r4:7f985000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd6b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cd38c r4:849cd000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cd38c r4:85bbf100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c01800 r8:85bbf12c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf100 r8:8027ed34 r7:edf61e60 r6:85a74580 r5:85c01800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf65fb0 to 0xedf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ba5c0 INFO: task kworker/0:761:8039 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c9327000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:8041 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:8041 tgid:8041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf69d84 r8:00000002 r7:60000113 r6:edf69d8c r5:85c00c00 r4:85c00c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c00c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7200 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f987000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecec1000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ccf8c r4:849ccc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ccf8c r4:85bbf180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c00c00 r8:85bbf1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf180 r8:8027ed34 r7:edf61e60 r6:85a74600 r5:85c00c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf69fb0 to 0xedf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd7100 INFO: task kworker/0:762:8041 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c961d000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:8043 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:8043 tgid:8043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf6dd84 r8:00000002 r7:60000113 r6:edf6dd8c r5:85c03000 r4:85c03000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c03000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd73c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c03000 r7:00000000 r6:83018000 r5:00001000 r4:7f98b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed123000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cc78c r4:849cc400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cc78c r4:85bbf200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c03000 r8:85bbf22c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf200 r8:8027ed34 r7:edf61e60 r6:85a74680 r5:85c03000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf6dfb0 to 0xedf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd7280 INFO: task kworker/0:763:8043 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c961d000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:8046 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:8046 tgid:8046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf71d84 r8:00000002 r7:60000013 r6:edf71d8c r5:85c06c00 r4:85c06c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c06c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd75c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f98f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed237000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849dff8c r4:849dfc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849dff8c r4:85bbf280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c06c00 r8:85bbf2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf280 r8:8027ed34 r7:edf6de60 r6:85a74700 r5:85c06c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf71fb0 to 0xedf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd7400 INFO: task kworker/0:764:8046 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c996c000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:765:8049 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:765 state:D stack:0 pid:8049 tgid:8049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf55d84 r8:00000002 r7:60000113 r6:edf55d8c r5:85c03c00 r4:85c03c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c03c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7680 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f991000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed321000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7038c r4:85c70000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7038c r4:85bbf300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c03c00 r8:85bbf32c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf300 r8:8027ed34 r7:edf71e60 r6:85a74780 r5:85c03c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf55fb0 to 0xedf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd7500 INFO: task kworker/0:765:8049 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: c9dfd000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:8051 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:8051 tgid:8051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf75d84 r8:00000002 r7:60000013 r6:edf75d8c r5:85c00000 r4:85c00000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c00000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd77c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c00000 r7:00000000 r6:83018000 r5:00001000 r4:7f993000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3b3000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7078c r4:85c70400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7078c r4:85bbf380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c00000 r8:85bbf3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf380 r8:8027ed34 r7:edf55e60 r6:85a74800 r5:85c00000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf75fb0 to 0xedf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd76c0 INFO: task kworker/0:766:8051 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: ca10c000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:8053 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:8053 tgid:8053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf7dd84 r8:00000002 r7:60000013 r6:edf7dd8c r5:85c10c00 r4:85c10c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c10c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7940 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f995000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3e5000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c70b8c r4:85c70800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c70b8c r4:85bbf400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c10c00 r8:85bbf42c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf400 r8:8027ed34 r7:edf75e60 r6:85a74880 r5:85c10c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf7dfb0 to 0xedf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd7800 INFO: task kworker/0:767:8053 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: ca735000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:768:8055 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:768 state:D stack:0 pid:8055 tgid:8055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edffdd84 r8:00000002 r7:60000013 r6:edffdd8c r5:85c10000 r4:85c10000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85c10000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edffde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7c00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c10000 r7:00000000 r6:83018000 r5:00001000 r4:7f999000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc75000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7138c r4:85c71000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7138c r4:85bbf480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c10000 r8:85bbf4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf480 r8:8027ed34 r7:edf7de60 r6:85a74900 r5:85c10000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedffdfb0 to 0xedffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd78c0 INFO: task kworker/0:768:8055 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cad13000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:8056 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:8056 tgid:8056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf59d84 r8:00000002 r7:60000013 r6:edf59d8c r5:858b9800 r4:858b9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858b9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7a00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f997000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc39000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c70f8c r4:85c70c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c70f8c r4:85bbf500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858b9800 r8:85bbf52c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf500 r8:8027ed34 r7:edffde60 r6:85bbf580 r5:858b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf59fb0 to 0xedf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd78c0 INFO: task kworker/0:769:8056 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cae86000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:8060 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:8060 tgid:8060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf81d84 r8:00000002 r7:60000113 r6:edf81d8c r5:858be000 r4:858be000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858be000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7cc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858be000 r7:00000000 r6:83018000 r5:00001000 r4:7f99b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc7d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7178c r4:85c71400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7178c r4:85bbf600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858be000 r8:85bbf62c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf600 r8:8027ed34 r7:edffde60 r6:85bbf680 r5:858be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf81fb0 to 0xedf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd7b40 INFO: task kworker/0:770:8060 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cae86000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:8061 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:8061 tgid:8061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee005d84 r8:00000002 r7:60000113 r6:ee005d8c r5:858bec00 r4:858bec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858bec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee005e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd7f00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f99d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc8f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c71b8c r4:85c71800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c71b8c r4:85bbf700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858bec00 r8:85bbf72c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf700 r8:8027ed34 r7:edf81e60 r6:85bbf780 r5:858bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee005fb0 to 0xee005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bd7b40 INFO: task kworker/0:771:8061 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cb1a3000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:772:8063 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:772 state:D stack:0 pid:8063 tgid:8063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee009d84 r8:00000002 r7:60000113 r6:ee009d8c r5:858b8c00 r4:858b8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858b8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee009e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba5e00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f99f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc9b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c71f8c r4:85c71c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c71f8c r4:85bbf800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858b8c00 r8:85bbf82c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf800 r8:8027ed34 r7:ee005e60 r6:85bbf880 r5:858b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee009fb0 to 0xee009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba5b40 INFO: task kworker/0:772:8063 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cb712000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:8066 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:8066 tgid:8066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee00dd84 r8:00000002 r7:60000113 r6:ee00dd8c r5:858bb000 r4:858bb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858bb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee00de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1040 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f9a1000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcad000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7238c r4:85c72000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7238c r4:85bbf900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858bb000 r8:85bbf92c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbf900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbf900 r8:8027ed34 r7:ee009e60 r6:85bbf980 r5:858bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee00dfb0 to 0xee00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b1080 INFO: task kworker/0:773:8066 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cb712000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:8067 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:8067 tgid:8067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee011d84 r8:00000002 r7:60000013 r6:ee011d8c r5:8493d400 r4:8493d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493d400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee011e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1280 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493d400 r7:00000000 r6:83018000 r5:00001000 r4:7f9a3000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcb9000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7278c r4:85c72400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7278c r4:85bbfa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493d400 r8:85bbfa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbfa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbfa00 r8:8027ed34 r7:ee00de60 r6:85bbfa80 r5:8493d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee011fb0 to 0xee011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b11c0 INFO: task kworker/0:774:8067 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cbd67000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:8070 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:8070 tgid:8070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee015d84 r8:00000002 r7:60000013 r6:ee015d8c r5:8493b000 r4:8493b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493b000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee015e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1380 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493b000 r7:00000000 r6:83018000 r5:00001000 r4:7f9a5000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edccb000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c72b8c r4:85c72800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c72b8c r4:85bbfb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493b000 r8:85bbfb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbfb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbfb00 r8:8027ed34 r7:ee011e60 r6:85bbfb80 r5:8493b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee015fb0 to 0xee015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b1180 INFO: task kworker/0:775:8070 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cc2ce000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:8071 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:8071 tgid:8071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee019d84 r8:00000002 r7:60000013 r6:ee019d8c r5:85be0000 r4:85be0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be0000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee019e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1680 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be0000 r7:00000000 r6:83018000 r5:00001000 r4:7f9a9000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edced000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7338c r4:85c73000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7338c r4:85bbfc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be0000 r8:85bbfc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbfc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbfc00 r8:8027ed34 r7:ee015e60 r6:85bbfc80 r5:85be0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee019fb0 to 0xee019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b1300 INFO: task kworker/0:776:8071 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cc495000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:8073 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:8073 tgid:8073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee01dd84 r8:00000002 r7:60000013 r6:ee01dd8c r5:85be0c00 r4:85be0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be0c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee01de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1500 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f9a7000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcd7000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c72f8c r4:85c72c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c72f8c r4:85bbfd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be0c00 r8:85bbfd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbfd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbfd00 r8:8027ed34 r7:ee019e60 r6:85bbfd80 r5:85be0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee01dfb0 to 0xee01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b1440 INFO: task kworker/0:777:8073 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cc495000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:8075 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:8075 tgid:8075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee021d84 r8:00000002 r7:60000013 r6:ee021d8c r5:85be1800 r4:85be1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be1800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee021e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b19c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be1800 r7:00000000 r6:83018000 r5:00001000 r4:7fa05000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd03000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c73b8c r4:85c73800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c73b8c r4:85bbfe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be1800 r8:85bbfe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbfe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbfe00 r8:8027ed34 r7:ee019e60 r6:85bbfe80 r5:85be1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee021fb0 to 0xee021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b15c0 INFO: task kworker/0:778:8075 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cc76c000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:779:8077 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:779 state:D stack:0 pid:8077 tgid:8077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:edf51d84 r8:00000002 r7:60000013 r6:edf51d8c r5:85be2400 r4:85be2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be2400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1800 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be2400 r7:00000000 r6:83018000 r5:00001000 r4:7f9ad000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcf9000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7378c r4:85c73400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7378c r4:85bbff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be2400 r8:85bbff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85bbff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bbff00 r8:8027ed34 r7:ee021e60 r6:85bbff80 r5:85be2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf51fb0 to 0xedf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b1740 INFO: task kworker/0:779:8077 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cc76c000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:8079 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:8079 tgid:8079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee025d84 r8:00000002 r7:60000013 r6:ee025d8c r5:85be3000 r4:85be3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be3000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee025e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1a80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be3000 r7:00000000 r6:83018000 r5:00001000 r4:7fa07000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd13000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c73f8c r4:85c73c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c73f8c r4:859b0000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be3000 r8:859b002c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0000 r8:8027ed34 r7:ee021e60 r6:859b0080 r5:85be3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee025fb0 to 0xee025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b1980 INFO: task kworker/0:780:8079 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cce6f000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:8081 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:8081 tgid:8081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee02dd84 r8:00000002 r7:60000013 r6:ee02dd8c r5:85be3c00 r4:85be3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be3c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee02de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1c80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be3c00 r7:00000000 r6:83018000 r5:00001000 r4:7fa09000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd3b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7c38c r4:85c7c000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7c38c r4:859b0100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be3c00 r8:859b012c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0100 r8:8027ed34 r7:ee025e60 r6:859b0180 r5:85be3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee02dfb0 to 0xee02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b1ac0 INFO: task kworker/0:781:8081 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cce6f000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:8083 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:8083 tgid:8083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee031d84 r8:00000002 r7:60000113 r6:ee031d8c r5:85be4800 r4:85be4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be4800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee031e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b1e00 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be4800 r7:00000000 r6:83018000 r5:00001000 r4:7fa0b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd45000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7c78c r4:85c7c400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7c78c r4:859b0200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be4800 r8:859b022c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0200 r8:8027ed34 r7:ee02de60 r6:859b0280 r5:85be4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee031fb0 to 0xee031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859b1bc0 INFO: task kworker/0:782:8083 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cd2e7000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:8085 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:8085 tgid:8085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee035d84 r8:00000002 r7:60000113 r6:ee035d8c r5:85be5400 r4:85be5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be5400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee035e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbcb80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be5400 r7:00000000 r6:83018000 r5:00001000 r4:7fa0d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd4d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7cb8c r4:85c7c800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7cb8c r4:859b0300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be5400 r8:859b032c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0300 r8:8027ed34 r7:ee031e60 r6:859b0380 r5:85be5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee035fb0 to 0xee035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85bbcf40 INFO: task kworker/0:783:8085 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cd2e7000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:8088 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:8088 tgid:8088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee029d84 r8:00000002 r7:60000013 r6:ee029d8c r5:85be6c00 r4:85be6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be6c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee029e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1040 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be6c00 r7:00000000 r6:83018000 r5:00001000 r4:7fa0f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd57000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7cf8c r4:85c7cc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7cf8c r4:859b0400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be6c00 r8:859b042c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0400 r8:8027ed34 r7:ee035e60 r6:859b0480 r5:85be6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee029fb0 to 0xee029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a11c0 INFO: task kworker/0:784:8088 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cd855000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:8090 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:8090 tgid:8090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee03dd84 r8:00000002 r7:60000013 r6:ee03dd8c r5:854b8000 r4:854b8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b8000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee03de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1140 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b8000 r7:00000000 r6:83018000 r5:00001000 r4:7fa11000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd5f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7d38c r4:85c7d000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7d38c r4:859b0500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8000 r8:859b052c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0500 r8:8027ed34 r7:ee029e60 r6:859b0580 r5:854b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee03dfb0 to 0xee03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a11c0 INFO: task kworker/0:785:8090 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cd855000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:8091 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:8091 tgid:8091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee041d84 r8:00000002 r7:60000013 r6:ee041d8c r5:854b8c00 r4:854b8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee041e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1980 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7fa17000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed527000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7df8c r4:85c7dc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7df8c r4:859b0600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8c00 r8:859b062c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0600 r8:8027ed34 r7:ee03de60 r6:859b0680 r5:854b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee041fb0 to 0xee041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a11c0 INFO: task kworker/0:786:8091 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cde1d000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:787:8093 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:787 state:D stack:0 pid:8093 tgid:8093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee049d84 r8:00000002 r7:60000013 r6:ee049d8c r5:854ba400 r4:854ba400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ba400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee049e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1540 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f9ed000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd71000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7d78c r4:85c7d400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7d78c r4:859b0700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:859b072c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0700 r8:8027ed34 r7:ee041e60 r6:859b0780 r5:854ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee049fb0 to 0xee049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a1580 INFO: task kworker/0:787:8093 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cde1d000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:8095 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:8095 tgid:8095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee04dd84 r8:00000002 r7:60000013 r6:ee04dd8c r5:854bbc00 r4:854bbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bbc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee04de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1900 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7fa15000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed425000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7db8c r4:85c7d800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7db8c r4:859b0800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bbc00 r8:859b082c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0800 r8:8027ed34 r7:ee041e60 r6:859b0880 r5:854bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee04dfb0 to 0xee04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a1500 INFO: task kworker/0:788:8095 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: ce356000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:8099 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:8099 tgid:8099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee055d84 r8:00000002 r7:60000013 r6:ee055d8c r5:854bb000 r4:854bb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee055e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1d80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854bb000 r7:00000000 r6:83018000 r5:00001000 r4:7fa1d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6c7000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7e38c r4:85c7e000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7e38c r4:859b0900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bb000 r8:859b092c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0900 r8:8027ed34 r7:ee041e60 r6:859b0980 r5:854bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee055fb0 to 0xee055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a1840 INFO: task kworker/0:789:8099 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: ce684000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:8103 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:8103 tgid:8103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee061d84 r8:00000002 r7:60000013 r6:ee061d8c r5:854bc800 r4:854bc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bc800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee061e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1bc0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854bc800 r7:00000000 r6:83018000 r5:00001000 r4:7fa21000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed74f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7e78c r4:85c7e400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7e78c r4:859b0a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bc800 r8:859b0a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0a00 r8:8027ed34 r7:ee055e60 r6:859b0a80 r5:854bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee061fb0 to 0xee061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a1c40 INFO: task kworker/0:790:8103 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: ce8c5000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:791:8106 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:791 state:D stack:0 pid:8106 tgid:8106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee065d84 r8:00000002 r7:60000013 r6:ee065d8c r5:854b9800 r4:854b9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee065e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd5700 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b9800 r7:00000000 r6:83018000 r5:00001000 r4:7fa23000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed77d000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7eb8c r4:85c7e800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7eb8c r4:859b0b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b9800 r8:859b0b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0b00 r8:8027ed34 r7:ee061e60 r6:859b0b80 r5:854b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee065fb0 to 0xee065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a1b80 INFO: task kworker/0:791:8106 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: ce8c5000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:792:8108 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:792 state:D stack:0 pid:8108 tgid:8108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee045d84 r8:00000002 r7:60000013 r6:ee045d8c r5:854be000 r4:854be000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854be000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee045e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b81c0 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854be000 r7:00000000 r6:83018000 r5:00001000 r4:7fa27000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed87b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7f38c r4:85c7f000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7f38c r4:859b0c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854be000 r8:859b0c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0c00 r8:8027ed34 r7:ee065e60 r6:859b0c80 r5:854be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee045fb0 to 0xee045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b8100 INFO: task kworker/0:792:8108 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: ce8c5000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:793:8111 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:793 state:D stack:0 pid:8111 tgid:8111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee069d84 r8:00000002 r7:60000113 r6:ee069d8c r5:854bec00 r4:854bec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bec00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee069e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8000 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854bec00 r7:00000000 r6:83018000 r5:00001000 r4:7fa25000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed81f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7ef8c r4:85c7ec00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7ef8c r4:859b0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bec00 r8:859b0d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0d00 r8:8027ed34 r7:ee045e60 r6:859b0d80 r5:854bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee069fb0 to 0xee069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b8300 INFO: task kworker/0:793:8111 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cebc3000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:794:8112 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:794 state:D stack:0 pid:8112 tgid:8112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee039d84 r8:00000002 r7:60000013 r6:ee039d8c r5:854bd400 r4:854bd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bd400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee039e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8400 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854bd400 r7:00000000 r6:83018000 r5:00001000 r4:7fa29000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8f5000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7f78c r4:85c7f400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7f78c r4:859b0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bd400 r8:859b0e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0e00 r8:8027ed34 r7:ee045e60 r6:859b0e80 r5:854bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee039fb0 to 0xee039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b8180 INFO: task kworker/0:794:8112 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cef46000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:795:8114 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:795 state:D stack:0 pid:8114 tgid:8114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee06dd84 r8:00000002 r7:60000013 r6:ee06dd8c r5:85be6000 r4:85be6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85be6000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee06de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8500 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85be6000 r7:00000000 r6:83018000 r5:00001000 r4:7fa2b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed94b000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7fb8c r4:85c7f800 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7fb8c r4:859b0f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85be6000 r8:859b0f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:859b0f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b0f00 r8:8027ed34 r7:ee039e60 r6:859b0f80 r5:85be6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee06dfb0 to 0xee06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b83c0 INFO: task kworker/0:795:8114 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cef46000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:796:8116 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:8116 tgid:8116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee075d84 r8:00000002 r7:60000013 r6:ee075d8c r5:848e8c00 r4:848e8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848e8c00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee075e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8680 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7fa2d000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed975000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c7ff8c r4:85c7fc00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c7ff8c r4:856cc000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e8c00 r8:856cc02c r7:82804d40 r6:dddced40 r5:dddced60 r4:856cc000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cc000 r8:8027ed34 r7:ee06de60 r6:856cc080 r5:848e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee075fb0 to 0xee075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b8480 INFO: task kworker/0:796:8116 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cf292000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:797:8117 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:797 state:D stack:0 pid:8117 tgid:8117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee079d84 r8:00000002 r7:60000013 r6:ee079d8c r5:848e9800 r4:848e9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848e9800 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee079e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8940 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848e9800 r7:00000000 r6:83018000 r5:00001000 r4:7fa2f000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed99f000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8838c r4:85c88000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c8838c r4:856cc100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e9800 r8:856cc12c r7:82804d40 r6:dddced40 r5:dddced60 r4:856cc100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cc100 r8:8027ed34 r7:ee075e60 r6:856cc180 r5:848e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee079fb0 to 0xee079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b85c0 INFO: task kworker/0:797:8117 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cf292000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:8119 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:798 state:D stack:0 pid:8119 tgid:8119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee07dd84 r8:00000002 r7:60000013 r6:ee07dd8c r5:848ea400 r4:848ea400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ea400 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee07de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8d80 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ea400 r7:00000000 r6:83018000 r5:00001000 r4:7fa37000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edac1000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c8878c r4:85c88400 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c8878c r4:856cc200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ea400 r8:856cc22c r7:82804d40 r6:dddced40 r5:dddced60 r4:856cc200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cc200 r8:8027ed34 r7:ee079e60 r6:856cc280 r5:848ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee07dfb0 to 0xee07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b8a80 INFO: task kworker/0:798:8119 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cf6b4000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:799:8125 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:799 state:D stack:0 pid:8125 tgid:8125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee089d84 r8:00000002 r7:60000113 r6:ee089d8c r5:848eb000 r4:848eb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848eb000 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee089e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4db4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8b40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848eb000 r7:00000000 r6:83018000 r5:00001000 r4:7fa3b000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edae7000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c88f8c r4:85c88c00 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c88f8c r4:856cc300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848eb000 r8:856cc32c r7:82804d40 r6:dddced40 r5:dddced60 r4:856cc300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cc300 r8:8027ed34 r7:ee07de60 r6:856cc380 r5:848eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee089fb0 to 0xee089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b8d40 INFO: task kworker/0:799:8125 is blocked on a mutex likely owned by task kworker/1:134:3830. task:kworker/1:134 state:R running task stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8487b000 r8:80200be4 r7:e06a9d54 r6:ffffffff r5:8487b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06a9d20 to 0xe06a9d68) 9d20: cf6b4000 ee7d7000 00000001 80239bb8 7f093000 00000001 82ac11c4 82ac05a0 9d40: 7f093000 ee7d7000 8280c9b4 e06a9d9c e06a9da0 e06a9d70 80230af4 80239bd0 9d60: 800e0013 ffffffff r5:800e0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4b78>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e48f4>] (__purge_vmap_area_lazy) from [<804e4f30>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06a9dc0 r5:e06a9e08 r4:e06a9dc0 [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d4c>] (_vm_unmap_aliases) from [<804e8ca4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fa40 r4:00000000 [<804e8b38>] (vfree) from [<80549e5c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549e2c>] (execmem_free) from [<803c6b9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b8c>] (bpf_jit_free_exec) from [<803c6f7c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f14>] (bpf_jit_free) from [<803c800c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a38c r4:8501a000 [<803c7ec0>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a38c r4:85093380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:850933ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093380 r8:8027ed34 r7:e0139e60 r6:85093400 r5:8487b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f600 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:800:8127 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:800 state:D stack:0 pid:8127 tgid:8127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:82918644 r9:ee071d84 r8:00000002 r7:60000113 r6:ee071d8c r5:848ebc00 r4:848ebc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ebc00 r4:82918640 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee071e08