Extracting prog: 5m8.066202704s Minimizing prog: 1h15m46.510507347s Simplifying prog options: 0s Extracting C: 8m39.450114762s Simplifying C: 58m20.573979564s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h27m54.600838427s repro crashed as (corrupted=false): INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:8324a400 r4:8324a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fe38c r4:857fe000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fe38c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830cb0c0 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 94858000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/1:2:1470 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:1470 tgid:1470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead01d84 r8:00000002 r7:60000013 r6:ead01d8c r5:83bc9800 r4:83bc9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83bc9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850873c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83bc9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fdf8c r4:857fdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fdf8c r4:841b8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83bc9800 r8:841b83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:841b8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841b8380 r8:8027ed34 r7:df925e60 r6:841b8400 r5:83bc9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead01fb0 to 0xead01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83da5080 INFO: task kworker/1:2:1470 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95061000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:0:3101 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3101 tgid:3101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df97dd84 r8:00000002 r7:60000113 r6:df97dd8c r5:84434800 r4:84434800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84434800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df97de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ad780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84434800 r7:00000000 r6:83018000 r5:00001000 r4:7f5ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee099000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dd9b8c r4:85dd9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85dd9b8c r4:84667480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84434800 r8:846674ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84667480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84667480 r8:8027ed34 r7:df911e60 r6:8476cc80 r5:84434800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf97dfb0 to 0xdf97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83c3ac80 INFO: task kworker/0:0:3101 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95471000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/1:1:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df981d84 r8:00000002 r7:60000113 r6:df981d8c r5:84431800 r4:84431800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84431800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84431800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec79b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fc78c r4:857fc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fc78c r4:8476ce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84431800 r8:8476ce2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476ce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ce00 r8:8027ed34 r7:ead01e60 r6:8476cf00 r5:84431800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477e080 INFO: task kworker/1:1:3123 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95471000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/1:4:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9a9d84 r8:00000002 r7:60000113 r6:df9a9d8c r5:8442d400 r4:8442d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8442d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8442d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500478c r4:85004400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500478c r4:8476ce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8442d400 r8:8476ceac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476ce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ce80 r8:8027ed34 r7:df981e60 r6:84667b80 r5:8442d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477e240 INFO: task kworker/1:4:3128 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95845000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:6:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:83af6c00 r4:83af6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd4800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83af6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff19000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba3b8c r4:84ba3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba3b8c r4:83349800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af6c00 r8:8334982c r7:82804d40 r6:dddced40 r5:dddced60 r4:83349800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349800 r8:8027ed34 r7:df921e60 r6:83349880 r5:83af6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763640 INFO: task kworker/0:6:3137 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95845000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:7:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:83af0000 r4:83af0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83af0000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe49000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dc78c r4:850dc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850dc78c r4:83dc4980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af0000 r8:83dc49ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83dc4980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83dc4980 r8:8027ed34 r7:df9cde60 r6:83937480 r5:83af0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847638c0 INFO: task kworker/0:7:3139 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95c4b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:8:3140 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83af5400 r4:83af5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c84c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83af5400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dcf8c r4:850dcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850dcf8c r4:83a05680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af5400 r8:83a056ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83a05680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83a05680 r8:8027ed34 r7:df9e1e60 r6:832d2c00 r5:83af5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847638c0 INFO: task kworker/0:8:3140 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95c4b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/1:5:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:83af0c00 r4:83af0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83af0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fc38c r4:857fc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fc38c r4:8476cd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af0c00 r8:8476cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476cd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476cd80 r8:8027ed34 r7:df981e60 r6:832d2b80 r5:83af0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477ea40 INFO: task kworker/1:5:3143 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9629f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:9:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:83af3c00 r4:83af3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83af3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512e38c r4:8512e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8512e38c r4:84221700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af3c00 r8:8422172c r7:82804d40 r6:dddced40 r5:dddced60 r4:84221700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84221700 r8:8027ed34 r7:df9d9e60 r6:830b8780 r5:83af3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763f40 INFO: task kworker/0:9:3144 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 965a1000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3147 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:838bec00 r4:838bec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838bec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e5840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb87000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dd78c r4:850dd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850dd78c r4:830b8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838bec00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ed34 r7:df9d9e60 r6:830b8480 r5:838bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763dc0 INFO: task kworker/0:10:3147 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 965a1000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3150 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:838bb000 r4:838bb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838bb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ccd00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527fb8c r4:8527f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527fb8c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838bb000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:dfa01e60 r6:847dae00 r5:838bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a280 INFO: task kworker/0:11:3150 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 968d4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:840a2400 r4:840a2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478a000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527ef8c r4:8527ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527ef8c r4:8478e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a2400 r8:8478e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e000 r8:8027ed34 r7:dfa15e60 r6:8478e080 r5:840a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a280 INFO: task kworker/0:12:3151 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 96ba5000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3152 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:840a6000 r4:840a6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533f940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a778c r4:852a7400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a778c r4:8478e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a6000 r8:8478e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e100 r8:8027ed34 r7:dfa15e60 r6:8478e180 r5:840a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a080 INFO: task kworker/0:13:3152 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 96ba5000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3154 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:840a3c00 r4:840a3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a578c r4:852a5400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a578c r4:8478e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a3c00 r8:8478e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e200 r8:8027ed34 r7:dfa2de60 r6:8478e280 r5:840a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a340 INFO: task kworker/0:14:3154 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9701b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3156 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:840a5400 r4:840a5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843265c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a8b8c r4:854a8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a8b8c r4:8478e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a5400 r8:8478e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e300 r8:8027ed34 r7:dfa2de60 r6:8478e380 r5:840a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a7c0 INFO: task kworker/0:15:3156 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 971bd000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:833c0c00 r4:833c0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833c0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85357040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85364f8c r4:85364c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85364f8c r4:8478e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833c0c00 r8:8478e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e400 r8:8027ed34 r7:dfa45e60 r6:8478e480 r5:833c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a640 INFO: task kworker/0:16:3158 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 971bd000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:833c3000 r4:833c3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833c3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85357440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85365b8c r4:85365800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85365b8c r4:8478e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833c3000 r8:8478e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e500 r8:8027ed34 r7:dfa45e60 r6:8478e580 r5:833c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a980 INFO: task kworker/0:17:3160 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 97526000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3163 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:840a6c00 r4:840a6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84326700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85366f8c r4:85366c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85366f8c r4:8478e600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a6c00 r8:8478e62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e600 r8:8027ed34 r7:dfa45e60 r6:8478e680 r5:840a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478ab40 INFO: task kworker/0:18:3163 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 97526000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3164 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:840a4800 r4:840a4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a85040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841eef8c r4:841eec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841eef8c r4:8478e700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a4800 r8:8478e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e700 r8:8027ed34 r7:dfa59e60 r6:8478e780 r5:840a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478ac80 INFO: task kworker/0:19:3164 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 97cd9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:840db000 r4:840db000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840db000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840db000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae19000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ef38c r4:841ef000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ef38c r4:8478e800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840db000 r8:8478e82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e800 r8:8027ed34 r7:dfa61e60 r6:8478e880 r5:840db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478afc0 INFO: task kworker/0:20:3166 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 97dc3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:840d8c00 r4:840d8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840d8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fe7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555978c r4:85559400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555978c r4:8478e900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840d8c00 r8:8478e92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e900 r8:8027ed34 r7:dfa6de60 r6:8478e980 r5:840d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790140 INFO: task kworker/0:21:3168 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 98214000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:8444ec00 r4:8444ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ae4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ef78c r4:841ef400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ef78c r4:8478ea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444ec00 r8:8478ea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ea00 r8:8027ed34 r7:dfa75e60 r6:8478ea80 r5:8444ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790100 INFO: task kworker/0:22:3170 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 98309000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3172 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:8444c800 r4:8444c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a8e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb553000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ab8c r4:8555a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555ab8c r4:8478eb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444c800 r8:8478eb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478eb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478eb00 r8:8027ed34 r7:dfa81e60 r6:8478eb80 r5:8444c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790480 INFO: task kworker/0:23:3172 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 984fa000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:84449800 r4:84449800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84449800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84449800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae93000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558238c r4:85582000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558238c r4:8478ec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84449800 r8:8478ec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ec00 r8:8027ed34 r7:dfa81e60 r6:8478ec80 r5:84449800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790400 INFO: task kworker/0:24:3174 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9868c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:8444e000 r4:8444e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518fc40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a0f8c r4:857a0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a0f8c r4:8478ed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444e000 r8:8478ed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ed00 r8:8027ed34 r7:dfa95e60 r6:8478ed80 r5:8444e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847905c0 INFO: task kworker/0:25:3176 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9891c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa9d84 r8:00000002 r7:60000013 r6:dfaa9d8c r5:8444a400 r4:8444a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444a400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85582b8c r4:85582800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85582b8c r4:8478ee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444a400 r8:8478ee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ee00 r8:8027ed34 r7:dfa9de60 r6:8478ee80 r5:8444a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790780 INFO: task kworker/0:26:3178 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 98d39000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:8444bc00 r4:8444bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb73000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578bf8c r4:8578bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578bf8c r4:8478ef00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444bc00 r8:8478ef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ef00 r8:8027ed34 r7:dfa9de60 r6:8478ef80 r5:8444bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790a80 INFO: task kworker/0:27:3179 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 991ae000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:8444d400 r4:8444d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec873000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a3b8c r4:857a3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a3b8c r4:847a7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444d400 r8:847a702c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7000 r8:8027ed34 r7:dfa9de60 r6:847a7080 r5:8444d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790ac0 INFO: task kworker/0:28:3182 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 991ae000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:84448000 r4:84448000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84448000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84448000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a238c r4:857a2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a238c r4:847a7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84448000 r8:847a712c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7100 r8:8027ed34 r7:dfabde60 r6:847a7180 r5:84448000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790b80 INFO: task kworker/0:29:3184 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 999f1000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3186 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:8446d400 r4:8446d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c53c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8446d400 r7:00000000 r6:83018000 r5:00001000 r4:7f115000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec88b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582178c r4:85821400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8582178c r4:847a7200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446d400 r8:847a722c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7200 r8:8027ed34 r7:dfabde60 r6:847a7280 r5:8446d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790cc0 INFO: task kworker/0:30:3186 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 99acd000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:8446c800 r4:8446c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bc880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8446c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb617000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85812f8c r4:85812c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85812f8c r4:847a7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446c800 r8:847a73ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7380 r8:8027ed34 r7:dfad1e60 r6:847a7400 r5:8446c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790cc0 INFO: task kworker/0:31:3187 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9a148000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3190 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:8446b000 r4:8446b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545bc80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8446b000 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb91000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f238c r4:841f2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f238c r4:847a7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446b000 r8:847a74ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7480 r8:8027ed34 r7:dfad1e60 r6:847a7500 r5:8446b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af080 INFO: task kworker/0:32:3190 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9a5fc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaedd84 r8:00000002 r7:60000013 r6:dfaedd8c r5:8446bc00 r4:8446bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8446bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858dc38c r4:858dc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858dc38c r4:847a7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446bc00 r8:847a75ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7580 r8:8027ed34 r7:dfae5e60 r6:847a7600 r5:8446bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af180 INFO: task kworker/0:33:3192 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9aa52000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84468c00 r4:84468c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84468c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854625c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84468c00 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85503f8c r4:85503c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85503f8c r4:847a7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84468c00 r8:847a76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7680 r8:8027ed34 r7:dfaede60 r6:847a7700 r5:84468c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af280 INFO: task kworker/0:34:3194 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9adde000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb05d84 r8:00000002 r7:60000013 r6:dfb05d8c r5:84468000 r4:84468000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84468000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84468000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588e38c r4:8588e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588e38c r4:847a7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84468000 r8:847a77ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7780 r8:8027ed34 r7:dfb01e60 r6:847a7800 r5:84468000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af280 INFO: task kworker/0:35:3195 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9adde000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:8446e000 r4:8446e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85169480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8446e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7af000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fcf8c r4:857fcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fcf8c r4:8476cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446e000 r8:8476cd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476cd00 r8:8027ed34 r7:df981e60 r6:847a7880 r5:8446e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b1340 INFO: task kworker/1:6:3198 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b101000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:84430000 r4:84430000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84430000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850876c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84430000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857feb8c r4:857fe800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857feb8c r4:8476c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84430000 r8:8476c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476c980 r8:8027ed34 r7:dfb1de60 r6:8476ca00 r5:84430000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b1340 INFO: task kworker/1:7:3201 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b28f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb11d84 r8:00000002 r7:60000013 r6:dfb11d8c r5:84433000 r4:84433000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84433000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84433000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fd78c r4:857fd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fd78c r4:8476ca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84433000 r8:8476caac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476ca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ca80 r8:8027ed34 r7:dfaf9e60 r6:8476cb00 r5:84433000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b1340 INFO: task kworker/1:8:3202 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b55a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:83bbe000 r4:83bbe000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83bbe000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83bbe000 r7:00000000 r6:83018000 r5:00001000 r4:7f219000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece07000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85502f8c r4:85502c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85502f8c r4:847a7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83bbe000 r8:847a792c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7900 r8:8027ed34 r7:dfb01e60 r6:8476c880 r5:83bbe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afb80 INFO: task kworker/0:36:3203 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b55a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb49d84 r8:00000002 r7:60000013 r6:dfb49d8c r5:84435400 r4:84435400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84435400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84435400 r7:00000000 r6:83018000 r5:00001000 r4:7f219000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85503b8c r4:85503800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85503b8c r4:847a7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84435400 r8:847a79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7980 r8:8027ed34 r7:dfb01e60 r6:8476c900 r5:84435400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afac0 INFO: task kworker/0:37:3207 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b55a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb4dd84 r8:00000002 r7:60000013 r6:dfb4dd8c r5:8323e000 r4:8323e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f459000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf55000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f8f8c r4:841f8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f8f8c r4:847a7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:847a7a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7a00 r8:8027ed34 r7:dfb49e60 r6:8476c800 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afb80 INFO: task kworker/0:38:3208 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9bde8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3210 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:832f8c00 r4:832f8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545ea80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f283000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec815000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85966f8c r4:85966c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85966f8c r4:847a7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f8c00 r8:847a7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7a80 r8:8027ed34 r7:dfb4de60 r6:8476c700 r5:832f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afb80 INFO: task kworker/0:39:3210 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9bde8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:832fec00 r4:832fec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832fec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f45b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf73000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f8b8c r4:841f8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f8b8c r4:847a7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832fec00 r8:847a7b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7b00 r8:8027ed34 r7:dfb4de60 r6:8476c780 r5:832fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477edc0 INFO: task kworker/0:40:3212 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9bde8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb79d84 r8:00000002 r7:60000013 r6:dfb79d8c r5:832f8000 r4:832f8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f457000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf2d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f938c r4:841f9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f938c r4:847a7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f8000 r8:847a7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7b80 r8:8027ed34 r7:dfb4de60 r6:8476c680 r5:832f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0100 INFO: task kworker/0:41:3214 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9bde8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3216 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb81d84 r8:00000002 r7:60000013 r6:dfb81d8c r5:849b0000 r4:849b0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841faf8c r4:841fac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841faf8c r4:847a7c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0000 r8:847a7c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7c00 r8:8027ed34 r7:dfb79e60 r6:8476c600 r5:849b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b00c0 INFO: task kworker/0:42:3216 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c1b9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:849b0c00 r4:849b0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b08c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecebb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f9b8c r4:841f9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f9b8c r4:847a7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0c00 r8:847a7cac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7c80 r8:8027ed34 r7:dfb81e60 r6:8476c580 r5:849b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b00c0 INFO: task kworker/0:43:3218 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c43e000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3220 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb8dd84 r8:00000002 r7:60000013 r6:dfb8dd8c r5:849b2400 r4:849b2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f3db000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece37000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fa38c r4:841fa000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fa38c r4:847a7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b2400 r8:847a7d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7d00 r8:8027ed34 r7:dfb81e60 r6:8476c280 r5:849b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b02c0 INFO: task kworker/0:44:3220 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c695000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:849b3c00 r4:849b3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3d9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fa78c r4:841fa400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fa78c r4:847a7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3c00 r8:847a7dac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7d80 r8:8027ed34 r7:dfb81e60 r6:8476c500 r5:849b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0400 INFO: task kworker/0:45:3222 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c735000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3224 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:849b1800 r4:849b1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece03000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fab8c r4:841fa800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fab8c r4:847a7e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:847a7e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7e00 r8:8027ed34 r7:dfb81e60 r6:8476c480 r5:849b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0580 INFO: task kworker/0:46:3224 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c735000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbadd84 r8:00000002 r7:60000013 r6:dfbadd8c r5:849b4800 r4:849b4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550d500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f3d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fb78c r4:841fb400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fb78c r4:847a7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b4800 r8:847a7eac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7e80 r8:8027ed34 r7:dfb81e60 r6:8476c180 r5:849b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b06c0 INFO: task kworker/0:47:3226 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9cdce000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3228 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:849b6000 r4:849b6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b1200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fb38c r4:841fb000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fb38c r4:847a7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6000 r8:847a7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7f00 r8:8027ed34 r7:dfbade60 r6:8476c100 r5:849b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0800 INFO: task kworker/0:48:3228 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9cdce000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbc9d84 r8:00000002 r7:60000013 r6:dfbc9d8c r5:849b6c00 r4:849b6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3c9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fbf8c r4:841fbc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fbf8c r4:847a7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6c00 r8:847a7fac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7f80 r8:8027ed34 r7:dfbade60 r6:8476c200 r5:849b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0ac0 INFO: task kworker/0:49:3231 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9d046000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3232 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd5d84 r8:00000002 r7:60000013 r6:dfbd5d8c r5:849b5400 r4:849b5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f3cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fbb8c r4:841fb800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fbb8c r4:847ba000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b5400 r8:847ba02c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba000 r8:8027ed34 r7:dfbc9e60 r6:8476c380 r5:849b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0d40 INFO: task kworker/0:50:3232 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9d4e3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3235 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:849b3000 r4:849b3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfb40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f3c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ccb8c r4:849cc800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ccb8c r4:847ba080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3000 r8:847ba0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba080 r8:8027ed34 r7:dfbc9e60 r6:8476c400 r5:849b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0d80 INFO: task kworker/0:51:3235 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9d4e3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3238 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:84831800 r4:84831800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84831800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84831800 r7:00000000 r6:83018000 r5:00001000 r4:7f3c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb0d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cc38c r4:849cc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cc38c r4:847ba100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84831800 r8:847ba12c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba100 r8:8027ed34 r7:dfbdde60 r6:8476c300 r5:84831800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0ec0 INFO: task kworker/0:52:3238 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9d6fb000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3239 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc01d84 r8:00000002 r7:60000013 r6:dfc01d8c r5:84830000 r4:84830000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84830000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfbc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830000 r7:00000000 r6:83018000 r5:00001000 r4:7f3c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca83000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ccf8c r4:849ccc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ccf8c r4:847ba180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:847ba1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba180 r8:8027ed34 r7:dfbdde60 r6:8476c000 r5:84830000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf080 INFO: task kworker/0:53:3239 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9dafc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3241 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc09d84 r8:00000002 r7:60000013 r6:dfc09d8c r5:84833000 r4:84833000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84833000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84833000 r7:00000000 r6:83018000 r5:00001000 r4:7f3bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cdf8c r4:849cdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cdf8c r4:847ba200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833000 r8:847ba22c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba200 r8:8027ed34 r7:dfc01e60 r6:8476c080 r5:84833000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf080 INFO: task kworker/0:54:3241 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9dafc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3242 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84830c00 r4:84830c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84830c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbdf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596738c r4:85967000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596738c r4:847ba280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830c00 r8:847ba2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba280 r8:8027ed34 r7:dfc09e60 r6:84667c00 r5:84830c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf080 INFO: task kworker/0:55:3242 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9dd5d000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3244 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc19d84 r8:00000002 r7:60000013 r6:dfc19d8c r5:84832400 r4:84832400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84832400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f3c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cd38c r4:849cd000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cd38c r4:847ba300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:847ba32c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba300 r8:8027ed34 r7:dfc09e60 r6:845f3380 r5:84832400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf080 INFO: task kworker/0:56:3244 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9e09c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3246 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:84833c00 r4:84833c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84833c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dbc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596778c r4:85967400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596778c r4:847ba380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833c00 r8:847ba3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba380 r8:8027ed34 r7:dfc09e60 r6:8458e500 r5:84833c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf300 INFO: task kworker/0:57:3246 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9e09c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3248 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84834800 r4:84834800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84834800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfdc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84834800 r7:00000000 r6:83018000 r5:00001000 r4:7f3bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca49000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cd78c r4:849cd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cd78c r4:847ba400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84834800 r8:847ba42c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba400 r8:8027ed34 r7:dfc09e60 r6:84290600 r5:84834800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf440 INFO: task kworker/0:58:3248 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9e774000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3250 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc49d84 r8:00000002 r7:60000013 r6:dfc49d8c r5:84835400 r4:84835400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84835400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfe80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84835400 r7:00000000 r6:83018000 r5:00001000 r4:7f3bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca1b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cdb8c r4:849cd800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cdb8c r4:847ba480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84835400 r8:847ba4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba480 r8:8027ed34 r7:dfc09e60 r6:832a1580 r5:84835400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf800 INFO: task kworker/0:59:3250 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9e774000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3253 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84a30c00 r4:84a30c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a30c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a30c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ce38c r4:849ce000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ce38c r4:847ba500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30c00 r8:847ba52c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba500 r8:8027ed34 r7:dfc09e60 r6:832a1500 r5:84a30c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf640 INFO: task kworker/0:60:3253 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3255 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84a31800 r4:84a31800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a31800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550d380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a31800 r7:00000000 r6:83018000 r5:00001000 r4:7f3b7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ce78c r4:849ce400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ce78c r4:847ba580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a31800 r8:847ba5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba580 r8:8027ed34 r7:dfc5de60 r6:832a1480 r5:84a31800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf640 INFO: task kworker/0:61:3255 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9eed9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:62 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:84a33c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b5000 r10:61c88647 r9:84a33c00 r8:847ba62c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 dd60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3259 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc81d84 r8:00000002 r7:60000013 r6:dfc81d8c r5:84a34800 r4:84a34800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a34800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ad840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a34800 r7:00000000 r6:83018000 r5:00001000 r4:7f5af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0a7000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a33000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:849cef8c r4:847ba700 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05dddc0 r4:00000000 r5:84b96f8c r4:84b96c00 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a35400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550db40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a35400 r7:00000000 r6:83018000 r5:00001000 r4:7f3b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc83000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cc78c r4:849cc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cc78c r4:847ba780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a35400 r8:847ba7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba780 r8:8027ed34 r7:dfc81e60 r6:83da6980 r5:84a35400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc99fb0 to 0xdfc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bfcc0 INFO: task kworker/0:65:3262 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9fc12000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/0:66:3264 blocked for more than 452 seconds. r5:84a32400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dec0 r7:dddced40 r6:83018000 r5:85967f8c r4:847ba800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:67:3266 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:84a36000 r4:84a36000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a36000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550de00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a36000 r7:00000000 r6:83018000 r5:00001000 r4:7f3ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85967b8c r4:85967800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85967b8c r4:847ba880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a36000 r8:847ba8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba880 r8:8027ed34 r7:dfc81e60 r6:847d5000 r5:84a36000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0f80 INFO: task kworker/0:67:3266 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a0402000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r4:e05dddc0 r4:00000000 r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a36c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:841f978c r4:847ba900 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 task:kworker/0:69 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:859fdf8c r4:847ba980 r10:61c88647 r9:84836c00 r8:847ba9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba980 r8:8027ed34 r7:dfc81e60 r6:847d5100 r5:84836c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848af100 INFO: task kworker/0:69:3271 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a0f61000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3272 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfafdd84 r8:00000002 r7:60000013 r6:dfafdd8c r5:84a20000 r4:84a20000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a20000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d0d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a20000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a20000 r8:847baa2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:9:3275 blocked for more than 452 seconds. r5:84a21800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a21800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fe78c r4:857fe400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fe78c r4:847d5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a21800 r8:847d522c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5200 r8:8027ed34 r7:dfaf9e60 r6:847d5280 r5:84a21800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c86c0 INFO: task kworker/1:9:3275 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a1676000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:10:3278 blocked for more than 452 seconds. r5:84a22400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a22400 r8:847d532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:11:3280 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:8446ec00 r4:8446ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8446ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ff38c r4:857ff000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857ff38c r4:847d5400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446ec00 r8:847d542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5400 r8:8027ed34 r7:dfccde60 r6:847baa80 r5:8446ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c85c0 INFO: task kworker/1:11:3280 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:12:3282 blocked for more than 452 seconds. r4:83240c00 r5:83240c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r9:83018205 r8:83240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 task:kworker/1:13 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83bbec00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087e00 r5:857ffb8c r4:857ff800 r4:847d5500 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c8b40 INFO: task kworker/1:13:3284 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a1e52000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3287 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:8389ec00 r4:8389ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8389ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856adac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8389ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f5b5000 r7:dddced40 r6:83018000 r5:85dda78c r4:847bac00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:14:3288 blocked for more than 452 seconds. r5:8389bc00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8389bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fff8c r4:857ffc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fff8c r4:847d5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8389bc00 r8:847d55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5580 r8:8027ed34 r7:dfad5e60 r6:847bad00 r5:8389bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c8fc0 INFO: task kworker/1:14:3288 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a2334000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:15:3290 blocked for more than 452 seconds. r5:84968000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8580838c r4:847d5600 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: a2334000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:16 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84968c00 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb699000 r10:61c88647 r9:84968c00 r8:847d56ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c8d40 INFO: task kworker/1:16:3291 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a26ec000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3293 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3293 tgid:3293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:8496a400 r4:8496a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb477000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580878c r4:85808400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580878c r4:847d5700 r10:00000000 r9:847d5700 r8:8027ed34 r7:dfcede60 r6:847bae80 r5:8496a400 r4:847db0c0 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84a23c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847d5780 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3298 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3298 tgid:3298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:84a24800 r4:84a24800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a24800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a24800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580938c r4:85809000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580938c r4:847d5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a24800 r8:847d58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5880 r8:8027ed34 r7:dfcede60 r6:847d5900 r5:84a24800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847db300 INFO: task kworker/1:19:3298 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a305a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a25400 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8580978c r4:85809400 r10:61c88647 r9:84a25400 r8:847d59ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd20: a358a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3302 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd01d84 r8:00000002 r7:60000113 r6:dfd01d8c r5:84a26000 r4:84a26000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a26000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb931000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3304 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:84a26c00 r4:84a26c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a26c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85809f8c r4:847d5b80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: a3a35000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) Not tainted 6.15.0-syzkaller #0 r4:84a20c00 r5:84a20c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r9:83018205 r8:84a20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8580a78c r4:847d5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a20c00 r8:847d5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5c80 r8:8027ed34 r7:dfd09e60 r6:847d5d00 r5:84a20c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847db840 INFO: task kworker/1:23:3306 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a424c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3308 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:84a23000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a64c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:25:3310 blocked for more than 452 seconds. r10:829187f4 r9:dfd15d84 r8:00000002 r7:60000113 r6:dfd15d8c r5:84469800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:ebaef000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3312 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3312 tgid:3312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd19d84 r8:00000002 r7:60000013 r6:dfd19d8c r5:84a30000 r4:84a30000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a30000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a30000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec42d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580af8c r4:8580ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580af8c r4:847d5f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30000 r8:847d5fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5f80 r8:8027ed34 r7:dfd15e60 r6:84882000 r5:84a30000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dbc80 INFO: task kworker/1:26:3312 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 dd20: a4a68000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84836000 r5:84836000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6880 r5:8580b38c r4:8580b000 r4:84882080 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfd21d84 r8:00000002 r7:60000113 r6:dfd21d8c r5:84438000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84438000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580b78c r4:8580b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580b78c r4:84882180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84438000 r8:848821ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84882180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84882180 r8:8027ed34 r7:dfd1de60 r6:84882200 r5:84438000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd21fb0 to 0xdfd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84745300 INFO: task kworker/1:28:3316 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0 <> ts bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:6250 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:6250 tgid:6250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccb5d84 r8:00000002 r7:60000113 r6:eccb5d8c r5:8593bc00 r4:8593bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c73c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589ef8c r4:8589ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589ef8c r4:858be080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593bc00 r8:858be0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be080 r8:8027ed34 r7:eccb1e60 r6:858be100 r5:8593bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb5fb0 to 0xeccb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7200 INFO: task kworker/0:425:6250 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 94340000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:426 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8593c800 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589f78c r4:8589f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589f78c r4:858be180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593c800 r8:858be1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be180 r8:8027ed34 r7:eccb5e60 r6:858be200 r5:8593c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb9fb0 to 0xeccb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7300 INFO: task kworker/0:426:6252 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 94340000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:6254 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:6254 tgid:6254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccbdd84 r8:00000002 r7:60000113 r6:eccbdd8c r5:8593d400 r4:8593d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccbde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca77000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589f38c r4:8589f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589f38c r4:858be280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593d400 r8:858be2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be280 r8:8027ed34 r7:eccb9e60 r6:858be300 r5:8593d400 Exception stack(0xeccbdfb0 to 0xeccbdff8) r4:858c76c0 Workqueue: events bpf_prog_free_deferred 5d20: 94340000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:850d6000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c78c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:858be380 r8:8027ed34 r7:eccb9e60 r6:8477f700 r5:850d6000 r4:858c7640 Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:6258 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:6258 tgid:6258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccd1d84 r8:00000002 r7:60000113 r6:eccd1d8c r5:85849800 r4:85849800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85849800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85849800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589fb8c r4:8589f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589fb8c r4:858be400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85849800 r8:858be42c r7:82804d40 r6:dddced40 r5:dddced60 r4:858be400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be400 r8:8027ed34 r7:ecccde60 r6:8477f780 r5:85849800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd1fb0 to 0xeccd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7780 INFO: task kworker/0:429:6258 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 94acb000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:8593ec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecaff000 r7:dddced40 r6:83018000 r5:855dc38c r4:858be480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:6262 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:6262 tgid:6262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccc1d84 r8:00000002 r7:60000013 r6:eccc1d8c r5:850d5400 r4:850d5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850d5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855dc78c r4:855dc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855dc78c r4:858be580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d5400 r8:858be5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be580 r8:8027ed34 r7:eccc9e60 r6:858be600 r5:850d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7b00 INFO: task kworker/0:431:6262 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:432 state:D stack:0 pid:6263 tgid:6263 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852c0c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf3c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855dcf8c r4:855dcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855dcf8c r4:858be680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c0c00 r8:858be6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be680 r8:8027ed34 r7:eccc1e60 r6:858be700 r5:852c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc5fb0 to 0xeccc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7bc0 INFO: task kworker/0:432:6263 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 951b6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:6266 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:852c2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeccd9fb0 to 0xeccd9ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:434 state:D stack:0 pid:6269 tgid:6269 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852c3000 r4:829187f0 r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:855dd38c r4:855dd000 r4:858be880 Exception stack(0xecce1fb0 to 0xecce1ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 95529000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:6272 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:6272 tgid:6272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccddd84 r8:00000002 r7:60000013 r6:eccddd8c r5:852c0000 r4:852c0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f1e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec881000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855de38c r4:855de000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855de38c r4:858be980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c0000 r8:858be9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be980 r8:8027ed34 r7:ecce1e60 r6:858bea00 r5:852c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccddfb0 to 0xeccddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac040 INFO: task kworker/0:435:6272 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 957cb000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:436:6273 blocked for more than 476 seconds. r5:852c3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac140 r5:855dd78c r4:855dd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855dd78c r4:858bea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c3c00 r8:858beaac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bea80 r8:8027ed34 r7:eccdde60 r6:858beb00 r5:852c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd5fb0 to 0xeccd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac180 INFO: task kworker/0:436:6273 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 958c7000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:437 state:D stack:0 pid:6275 tgid:6275 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852c5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ddb8c r4:855dd800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ddb8c r4:858beb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c5400 r8:858bebac r7:82804d40 r6:dddced40 r5:dddced60 r4:858beb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858beb80 r8:8027ed34 r7:eccdde60 r6:858bec00 r5:852c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce9fb0 to 0xecce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac340 INFO: task kworker/0:437:6275 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 958c7000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:8593e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ddf8c r4:855ddc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ddf8c r4:858bec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593e000 r8:858becac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bec80 r8:8027ed34 r7:eccdde60 r6:8477f800 r5:8593e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccedfb0 to 0xeccedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac5c0 INFO: task kworker/0:438:6276 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 95b8f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:6281 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:6281 tgid:6281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:852c6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858acc00 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855def8c r4:855dec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855def8c r4:858bed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c6000 r8:858bed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858bed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bed00 r8:8027ed34 r7:eccdde60 r6:858bed80 r5:852c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf1fb0 to 0xeccf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac880 INFO: task kworker/0:439:6281 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 95b8f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:6282 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:6282 tgid:6282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecce5d84 r8:00000002 r7:60000013 r6:ecce5d8c r5:852c6c00 r4:852c6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:858acac0 5d20: 961b8000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:852c4800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852c4800 r8:858bef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858bef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bef00 r8:8027ed34 r7:eccf1e60 r6:858bef80 r5:852c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf5fb0 to 0xeccf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858aca00 INFO: task kworker/0:441:6284 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 961b8000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852c1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:852c1800 r8:84b2e02c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85940000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858acd80 r10:61c88647 r9:85940000 r8:84b2e12c r7:82804d40 r6:dddced40 r5:dddced60 Call trace: r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85940c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd01e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b17100 INFO: task kworker/0:444:6290 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 968f6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Call trace: r5:85941800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd05e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85943000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17740 r4:84b2e400 r4:84b17180 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 968f6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:6297 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:6297 tgid:6297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd19d84 r8:00000002 r7:60000113 r6:ecd19d8c r5:85944800 r4:85944800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85944800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd19e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85944800 r7:00000000 r6:83018000 r5:00001000 r4:7f1fd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550078c r4:85500400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550078c r4:84b2e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85944800 r8:84b2e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2e500 r8:8027ed34 r7:ecd0de60 r6:84b2e580 r5:85944800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd19fb0 to 0xecd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b175c0 INFO: task kworker/0:447:6297 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 96c1c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:6301 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:6301 tgid:6301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd15d84 r8:00000002 r7:60000113 r6:ecd15d8c r5:85942400 r4:85942400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85942400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd15e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85942400 r7:00000000 r6:83018000 r5:00001000 r4:7f201000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc43000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85942400 r8:84b2e62c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Workqueue: events bpf_prog_free_deferred r5:85945400 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85945400 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc1d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85500b8c r4:85500800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85500b8c r4:84b2e780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85945400 r8:84b2e7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2e780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2e780 r8:8027ed34 r7:ecd15e60 r6:84b2e800 r5:85945400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd09fb0 to 0xecd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b178c0 INFO: task kworker/0:449:6302 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800f0013 ffffffff r4:00000000 r5:85df1b8c r4:85df1800 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Workqueue: events bpf_prog_free_deferred r5:85946000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b17a00 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 r5:85df1b8c r4:85df1800 Exception stack(0xe05e5fb0 to 0xe05e5ff8) task:kworker/0:451 state:D stack:0 pid:6306 tgid:6306 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85946c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd1de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85946c00 r7:00000000 r6:83018000 r5:00001000 r4:7f205000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550178c r4:85501400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550178c r4:84b2e900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85946c00 r8:84b2e92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2e900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2e900 r8:8027ed34 r7:ecd11e60 r6:84b2e980 r5:85946c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd1dfb0 to 0xecd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b17b40 INFO: task kworker/0:451:6306 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85943c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r4:00000001 r4:84bbf4c0 Call trace: r5:85851800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85850000 r4:829187f0 r4:00000000 r9:83018005 r8:85850000 r7:00000000 r6:83018000 r5:00001000 r4:7f209000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd2d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85501f8c r4:85501c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85501f8c r4:84b2eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85850000 r8:84b2ebac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2eb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2eb80 r8:8027ed34 r7:ecd35e60 r6:8477f900 r5:85850000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd4dfb0 to 0xecd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086280 INFO: task kworker/0:454:6312 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d20: 97eda000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85852400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85852400 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd3f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550238c r4:85502000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550238c r4:84b2ec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85852400 r8:84b2ec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2ec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2ec00 r8:8027ed34 r7:ecd35e60 r6:8477f980 r5:85852400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 800f0013 ffffffff r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:852d0000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850863c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd57000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550278c r4:85502400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550278c r4:84b2ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d0000 r8:84b2ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2ec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2ec80 r8:8027ed34 r7:ecd35e60 r6:84b2ed00 r5:852d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd31fb0 to 0xecd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbf4c0 r4:852d1800 r5:852d1800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852d4800 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858eff8c r4:858efc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858eff8c r4:84b2ee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d4800 r8:84b2eeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2ee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2ee80 r8:8027ed34 r7:ecd35e60 r6:84b2ef00 r5:852d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd81fb0 to 0xecd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086bc0 INFO: task kworker/0:458:6328 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852d3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f600 r4:00000001 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:852d5400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecd95fb0 to 0xecd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b2f900 INFO: task kworker/0:460:6380 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9890f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:6425 blocked for more than 477 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:852d6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852d6c00 r8:858b71ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7180 r8:8027ed34 r7:ecd35e60 r6:858b7200 r5:852d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec919fb0 to 0xec919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462740 INFO: task kworker/0:461:6425 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:852d6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462cc0 r5:8595078c r4:85950400 r10:61c88647 r9:852d6000 r8:858b72ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: 98cd1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:6429 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:6429 tgid:6429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8d1d84 r8:00000002 r7:60000013 r6:ec8d1d8c r5:852d2400 r4:852d2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f273000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec925000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595038c r4:85950000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595038c r4:858b7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d2400 r8:858b73ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7380 r8:8027ed34 r7:ec929e60 r6:858b7400 r5:852d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d1fb0 to 0xec8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462980 INFO: task kworker/0:463:6429 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 99085000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:6432 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:6432 tgid:6432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec931d84 r8:00000002 r7:60000113 r6:ec931d8c r5:852d3000 r4:852d3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f279000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb25000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85950f8c r4:85950c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85950f8c r4:858b7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d3000 r8:858b74ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7480 r8:8027ed34 r7:ec929e60 r6:858b7500 r5:852d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec931fb0 to 0xec931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462c80 INFO: task kworker/0:464:6432 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9951a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:6434 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:6434 tgid:6434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec945d84 r8:00000002 r7:60000113 r6:ec945d8c r5:852d0c00 r4:852d0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f277000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec941000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85950b8c r4:85950800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85950b8c r4:858b7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d0c00 r8:858b75ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7580 r8:8027ed34 r7:ec931e60 r6:858b7600 r5:852d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462d40 INFO: task kworker/0:465:6434 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9951a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:6436 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:6436 tgid:6436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8e9d84 r8:00000002 r7:60000013 r6:ec8e9d8c r5:85980000 r4:85980000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85980000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aff40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85980000 r7:00000000 r6:83018000 r5:00001000 r4:7f27b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb629000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595138c r4:85951000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595138c r4:858b7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85980000 r8:858b76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7680 r8:8027ed34 r7:ec931e60 r6:858b7700 r5:85980000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e9fb0 to 0xec8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7d40 INFO: task kworker/0:466:6436 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9951a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:6438 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:6438 tgid:6438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:85980c00 r4:85980c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85980c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854622c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85980c00 r7:00000000 r6:83018000 r5:00001000 r4:7f27d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595178c r4:85951400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595178c r4:858b7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85980c00 r8:858b77ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7780 r8:8027ed34 r7:ec8e9e60 r6:858b7800 r5:85980c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec985fb0 to 0xec985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462440 INFO: task kworker/0:467:6438 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 999b1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:6440 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:6440 tgid:6440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec989d84 r8:00000002 r7:60000013 r6:ec989d8c r5:85981800 r4:85981800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85981800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854591c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85981800 r7:00000000 r6:83018000 r5:00001000 r4:7f283000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec761000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595238c r4:85952000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595238c r4:858b7880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85981800 r8:858b78ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7880 r8:8027ed34 r7:ec985e60 r6:858b7900 r5:85981800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d4a00 INFO: task kworker/0:468:6440 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 999b1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:6442 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:6442 tgid:6442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec939d84 r8:00000002 r7:60000113 r6:ec939d8c r5:85982400 r4:85982400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85982400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d4f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85982400 r7:00000000 r6:83018000 r5:00001000 r4:7f27f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85951b8c r4:85951800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85951b8c r4:858b7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85982400 r8:858b79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7980 r8:8027ed34 r7:ec989e60 r6:858b7a00 r5:85982400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec939fb0 to 0xec939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462100 INFO: task kworker/0:469:6442 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 99d7d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:6443 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:6443 tgid:6443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec98dd84 r8:00000002 r7:60000113 r6:ec98dd8c r5:85983000 r4:85983000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85983000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec98de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85983000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec751000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85951f8c r4:85951c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85951f8c r4:858b7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85983000 r8:858b7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7a80 r8:8027ed34 r7:ec989e60 r6:858b7b00 r5:85983000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec98dfb0 to 0xec98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459180 INFO: task kworker/0:470:6443 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a1bd000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:6446 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:6446 tgid:6446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec995d84 r8:00000002 r7:60000113 r6:ec995d8c r5:85983c00 r4:85983c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85983c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f285000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595278c r4:85952400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595278c r4:858b7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85983c00 r8:858b7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7b80 r8:8027ed34 r7:ec989e60 r6:858b7c00 r5:85983c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec995fb0 to 0xec995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459100 INFO: task kworker/0:471:6446 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a48c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:6448 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:6448 tgid:6448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec991d84 r8:00000002 r7:60000013 r6:ec991d8c r5:85984800 r4:85984800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85984800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854594c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85984800 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7bf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85952b8c r4:85952800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85952b8c r4:858b7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85984800 r8:858b7cac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7c80 r8:8027ed34 r7:ec995e60 r6:858b7d00 r5:85984800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854592c0 INFO: task kworker/0:472:6448 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a59a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:6451 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec999d84 r8:00000002 r7:60000013 r6:ec999d8c r5:85985400 r4:85985400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85985400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85985400 r7:00000000 r6:83018000 r5:00001000 r4:7f28b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595338c r4:85953000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595338c r4:858b7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85985400 r8:858b7dac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7d80 r8:8027ed34 r7:ec991e60 r6:858b7e00 r5:85985400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec999fb0 to 0xec999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459480 INFO: task kworker/0:473:6451 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a59a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:6452 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:6452 tgid:6452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9a1d84 r8:00000002 r7:60000013 r6:ec9a1d8c r5:85986000 r4:85986000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85986000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85986000 r7:00000000 r6:83018000 r5:00001000 r4:7f289000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85952f8c r4:85952c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85952f8c r4:858b7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85986000 r8:858b7eac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7e80 r8:8027ed34 r7:ec999e60 r6:858b7f00 r5:85986000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854595c0 INFO: task kworker/0:474:6452 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a93c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:6455 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:6455 tgid:6455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9a5d84 r8:00000002 r7:60000113 r6:ec9a5d8c r5:85986c00 r4:85986c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85986c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85986c00 r7:00000000 r6:83018000 r5:00001000 r4:7f28d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec813000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595378c r4:85953400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595378c r4:858b7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85986c00 r8:858b7fac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7f80 r8:8027ed34 r7:ec999e60 r6:851f5000 r5:85986c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854596c0 INFO: task kworker/0:475:6455 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:6457 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:6457 tgid:6457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9add84 r8:00000002 r7:60000113 r6:ec9add8c r5:84998000 r4:84998000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84998000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854599c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84998000 r7:00000000 r6:83018000 r5:00001000 r4:7f28f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec837000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85953b8c r4:85953800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85953b8c r4:851f5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84998000 r8:851f50ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5080 r8:8027ed34 r7:ec9a5e60 r6:851f5100 r5:84998000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459800 INFO: task kworker/0:476:6457 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ed641000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:6458 tgid:6458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec99dd84 r8:00000002 r7:60000113 r6:ec99dd8c r5:84998c00 r4:84998c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84998c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459800 INFO: task kworker/0:477:6458 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9acb7000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:6460 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:6460 tgid:6460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9b1d84 r8:00000002 r7:60000113 r6:ec9b1d8c r5:84999800 r4:84999800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84999800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8595838c r4:851f5280 r10:61c88647 r9:84999800 r8:851f52ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xec9b1fb0 to 0xec9b1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:6463 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:6463 tgid:6463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9bdd84 r8:00000002 r7:60000013 r6:ec9bdd8c r5:8499a400 r4:8499a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b1780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499a400 r7:00000000 r6:83018000 r5:00001000 r4:7f295000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec887000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595878c r4:85958400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595878c r4:851f5380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499a400 r8:851f53ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5380 r8:8027ed34 r7:ec9b1e60 r6:851f5400 r5:8499a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459d40 INFO: task kworker/0:479:6463 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9afb1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:6464 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:6464 tgid:6464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece29d84 r8:00000002 r7:60000013 r6:ece29d8c r5:85850c00 r4:85850c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85850c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece29e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85850c00 r7:00000000 r6:83018000 r5:00001000 r4:7f297000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85958b8c r4:85958800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85958b8c r4:851f5480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85850c00 r8:851f54ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5480 r8:8027ed34 r7:ec9bde60 r6:8477fa00 r5:85850c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece29fb0 to 0xece29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa080 INFO: task kworker/0:480:6464 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9b94d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:6467 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:6467 tgid:6467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece61d84 r8:00000002 r7:60000013 r6:ece61d8c r5:85856000 r4:85856000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85856000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece61e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85856000 r7:00000000 r6:83018000 r5:00001000 r4:7f299000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85958f8c r4:85958c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85958f8c r4:851f5500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85856000 r8:851f552c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5500 r8:8027ed34 r7:ece29e60 r6:8477fa80 r5:85856000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece61fb0 to 0xece61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa2c0 INFO: task kworker/0:481:6467 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9b94d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:6468 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:6468 tgid:6468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece65d84 r8:00000002 r7:60000113 r6:ece65d8c r5:85853c00 r4:85853c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85853c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece65e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f29f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8db000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85959b8c r4:85959800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85959b8c r4:851f5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85853c00 r8:851f55ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5580 r8:8027ed34 r7:ece61e60 r6:8477fb00 r5:85853c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece65fb0 to 0xece65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa2c0 INFO: task kworker/0:482:6468 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9bc7a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:6469 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:6469 tgid:6469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9cdd84 r8:00000002 r7:60000113 r6:ec9cdd8c r5:8499b000 r4:8499b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499b000 r7:00000000 r6:83018000 r5:00001000 r4:7f29b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595938c r4:85959000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595938c r4:851f5600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499b000 r8:851f562c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5600 r8:8027ed34 r7:ece65e60 r6:851f5680 r5:8499b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9cdfb0 to 0xec9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa2c0 INFO: task kworker/0:483:6469 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9bc7a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:6472 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:6472 tgid:6472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece69d84 r8:00000002 r7:60000113 r6:ece69d8c r5:8499bc00 r4:8499bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece69e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f29d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595978c r4:85959400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595978c r4:851f5700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499bc00 r8:851f572c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5700 r8:8027ed34 r7:ece65e60 r6:851f5780 r5:8499bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece69fb0 to 0xece69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa300 INFO: task kworker/0:484:6472 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9c0ae000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:6475 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:6475 tgid:6475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece6dd84 r8:00000002 r7:60000113 r6:ece6dd8c r5:8499c800 r4:8499c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499c800 r7:00000000 r6:83018000 r5:00001000 r4:7f2a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec907000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85959f8c r4:85959c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85959f8c r4:851f5800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499c800 r8:851f582c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5800 r8:8027ed34 r7:ece65e60 r6:851f5880 r5:8499c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece6dfb0 to 0xece6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa580 INFO: task kworker/0:485:6475 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9c6d6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:6476 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:6476 tgid:6476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece71d84 r8:00000002 r7:60000113 r6:ece71d8c r5:8499d400 r4:8499d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece71e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fabc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499d400 r7:00000000 r6:83018000 r5:00001000 r4:7f2a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595ab8c r4:8595a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595ab8c r4:851f5900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499d400 r8:851f592c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5900 r8:8027ed34 r7:ece6de60 r6:851f5980 r5:8499d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece71fb0 to 0xece71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa580 INFO: task kworker/0:486:6476 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9c6d6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:6478 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:6478 tgid:6478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece75d84 r8:00000002 r7:60000113 r6:ece75d8c r5:8499e000 r4:8499e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece75e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec913000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8595a38c r4:8595a000 r10:61c88647 r9:8499e000 r8:851f5a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa900 INFO: task kworker/0:487:6478 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9c8e2000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:6481 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece79d84 r8:00000002 r7:60000113 r6:ece79d8c r5:8499ec00 r4:8499ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec921000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595a78c r4:8595a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595a78c r4:851f5b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fad00 INFO: task kworker/0:488:6481 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9ce09000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:6482 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:6482 tgid:6482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece7dd84 r8:00000002 r7:60000113 r6:ece7dd8c r5:85988000 r4:85988000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85988000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece7de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fad80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85988000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595af8c r4:8595ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595af8c r4:851f5c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85988000 r8:851f5c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5c00 r8:8027ed34 r7:ece71e60 r6:851f5c80 r5:85988000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece7dfb0 to 0xece7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d20: 9ce09000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:6485 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:6485 tgid:6485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece81d84 r8:00000002 r7:60000113 r6:ece81d8c r5:85988c00 r4:85988c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85988c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85988c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec97d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595b38c r4:8595b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595b38c r4:851f5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85988c00 r8:851f5d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5d00 r8:8027ed34 r7:ece7de60 r6:851f5d80 r5:85988c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece81fb0 to 0xece81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fad40 INFO: task kworker/0:490:6485 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9d274000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece85e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec9c9d84 r8:00000002 r7:60000013 r6:ec9c9d8c r5:8598b000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0140 r5:8595bb8c r4:8595b800 r10:61c88647 r9:8598b000 r8:851f5f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5f00 r8:8027ed34 r7:ece85e60 r6:851f5f80 r5:8598b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0240 INFO: task kworker/0:492:6488 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9d653000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:6490 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:6490 tgid:6490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece8dd84 r8:00000002 r7:60000013 r6:ece8dd8c r5:8598bc00 r4:8598bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8598bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece8de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b03c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8598bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595bf8c r4:8595bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595bf8c r4:858a8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8598bc00 r8:858a802c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8000 r8:8027ed34 r7:ec9c9e60 r6:858a8080 r5:8598bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece8dfb0 to 0xece8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0100 INFO: task kworker/0:493:6490 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9da34000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:6492 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:6492 tgid:6492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece91d84 r8:00000002 r7:60000013 r6:ece91d8c r5:8598d400 r4:8598d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8598d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8598d400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca21000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596438c r4:85964000 r7:dddced40 r6:83018000 r5:8596438c r4:858a8100 r4:00000001 Exception stack(0xece91fb0 to 0xece91ff8) r4:858b0380 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8598c800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:6499 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece89d84 r8:00000002 r7:60000113 r6:ece89d8c r5:8598e000 r4:8598e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8598e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8598e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca31000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596478c r4:85964400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596478c r4:858a8300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8598e000 r8:858a832c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8300 r8:8027ed34 r7:ece9de60 r6:858a8380 r5:8598e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece89fb0 to 0xece89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:497 state:D stack:0 pid:6501 tgid:6501 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8598ec00 r8:858a842c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:6502 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:6502 tgid:6502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecea5d84 r8:00000002 r7:60000113 r6:ecea5d8c r5:8598a400 r4:8598a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8598a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8598a400 r7:00000000 r6:83018000 r5:00001000 r4:7f2c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca81000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596578c r4:85965400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596578c r4:858a8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8598a400 r8:858a852c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8500 r8:8027ed34 r7:ece95e60 r6:858a8580 r5:8598a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea5fb0 to 0xecea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:6505 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:6505 tgid:6505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecea9d84 r8:00000002 r7:60000013 r6:ecea9d8c r5:853a9800 r4:853a9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596538c r4:85965000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596538c r4:858a8600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a9800 r8:858a862c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8600 r8:8027ed34 r7:ecea5e60 r6:858a8680 r5:853a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 r5:00001000 r4:ed641000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:6508 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:6508 tgid:6508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceb1d84 r8:00000002 r7:60000113 r6:eceb1d8c r5:85853000 r4:85853000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85853000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85853000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca8f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85965b8c r4:85965800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85965b8c r4:858a8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:501 state:D stack:0 pid:6510 tgid:6510 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2400 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:858a8780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9eeaf000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:6512 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:6512 tgid:6512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecec1d84 r8:00000002 r7:60000013 r6:ecec1d8c r5:85855400 r4:85855400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85855400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85855400 r7:00000000 r6:83018000 r5:00001000 r4:7f2c9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca99000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85965f8c r4:85965c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85965f8c r4:858a8800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85855400 r8:858a882c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8800 r8:8027ed34 r7:eceb9e60 r6:8477fc80 r5:85855400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec1fb0 to 0xecec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b22c0 INFO: task kworker/0:502:6512 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb9a1000 r7:dddced40 r6:83018000 r5:8596678c r4:858a8880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:6520 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:6520 tgid:6520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceadd84 r8:00000002 r7:60000113 r6:eceadd8c r5:853a8c00 r4:853a8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545e540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f311000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf75000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85966b8c r4:85966800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85966b8c r4:858a8900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a8c00 r8:858a892c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeceadfb0 to 0xeceadff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:6536 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:6536 tgid:6536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecee1d84 r8:00000002 r7:60000113 r6:ecee1d8c r5:853abc00 r4:853abc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853abc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545e480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f30f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f378c r4:855f3400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 task:kworker/0:506 state:D stack:0 pid:6559 tgid:6559 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: 9f9b9000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:6562 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:6562 tgid:6562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf89d84 r8:00000002 r7:60000113 r6:ecf89d8c r5:853ae000 r4:853ae000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ae000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848af080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f45d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f878c r4:841f8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f878c r4:858a8c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ae000 r8:858a8c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8c00 r8:8027ed34 r7:ecf6de60 r6:858a8c80 r5:853ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf89fb0 to 0xecf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545e600 INFO: task kworker/0:507:6562 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a00d5000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:6800 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:6800 tgid:6800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed101d84 r8:00000002 r7:60000013 r6:ed101d8c r5:853a8000 r4:853a8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed101e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f465000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:853ac800 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:853ac800 r8:858a8e2c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:6804 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:6804 tgid:6804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed1a1d84 r8:00000002 r7:60000013 r6:ed1a1d8c r5:853ad400 r4:853ad400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ad400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f463000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cf38c r4:849cf000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cf38c r4:858a8f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ad400 r8:858a8f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8f00 r8:8027ed34 r7:ed101e60 r6:858a8f80 r5:853ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a1fb0 to 0xed1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a79580 INFO: task kworker/0:510:6804 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a0963000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:ed641000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Not tainted 6.15.0-syzkaller #0 r5:853aec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f467000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9c38c r4:85a9c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9c38c r4:85a72000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853aec00 r8:85a7202c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72000 r8:8027ed34 r7:ed101e60 r6:85a72080 r5:853aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2bdfb0 to 0xed2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a793c0 INFO: task kworker/0:511:6806 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a1238000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:6808 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:6808 tgid:6808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:853ab000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f46d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9cb8c r4:85a9c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9cb8c r4:85a72100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ab000 r8:85a7212c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72100 r8:8027ed34 r7:ed2bde60 r6:85a72180 r5:853ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c1fb0 to 0xed2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a793c0 INFO: task kworker/0:512:6808 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a1238000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85858000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85a72200 Exception stack(0xed1f1fb0 to 0xed1f1ff8) 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85858c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85858c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85858c00 r7:00000000 r6:83018000 r5:00001000 r4:7f46f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed10b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9cf8c r4:85a9cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9cf8c r4:85a72300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85858c00 r8:85a7232c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85859800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed2cdfb0 to 0xed2cdff8) r4:85a798c0 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:6817 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:6817 tgid:6817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2d1d84 r8:00000002 r7:60000113 r6:ed2d1d8c r5:8585a400 r4:8585a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a79c40 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:517:6820 blocked for more than 478 seconds. r5:8585b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:6821 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:6821 tgid:6821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2d9d84 r8:00000002 r7:60000113 r6:ed2d9d8c r5:8585bc00 r4:8585bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858aa1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8585bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f475000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed13b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9db8c r4:85a9d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9db8c r4:85a72700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85a72700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72700 r8:8027ed34 r7:ed2d5e60 r6:85a72780 r5:8585bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2d9fb0 to 0xed2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a79e80 INFO: task kworker/0:518:6821 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a2bff000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:519 state:D stack:0 pid:6823 tgid:6823 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8585c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85a72800 r8:8027ed34 r7:ed2d5e60 r6:85a72880 r5:8585c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:520 state:D stack:0 pid:6825 tgid:6825 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8585d400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e1e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e5dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:521 state:D stack:0 pid:6828 tgid:6828 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8585e000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9eb8c r4:85a72a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585e000 r8:85a72a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72a00 r8:8027ed34 r7:ed2e1e60 r6:85a72a80 r5:8585e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2e5fb0 to 0xed2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a61300 INFO: task kworker/0:521:6828 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a337e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:6829 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:6829 tgid:6829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2e9d84 r8:00000002 r7:60000113 r6:ed2e9d8c r5:8585ec00 r4:8585ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8585ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f47f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed183000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9ef8c r4:85a9ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9ef8c r4:85a72b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85a72b00 Exception stack(0xed2e9fb0 to 0xed2e9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e5dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:6831 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:6831 tgid:6831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2c9d84 r8:00000002 r7:60000113 r6:ed2c9d8c r5:855c0c00 r4:855c0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f489000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1db000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9ff8c r4:85a9fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9ff8c r4:85a72c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0c00 r8:85a72c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72c00 r8:8027ed34 r7:ed2e9e60 r6:85a72c80 r5:855c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c9fb0 to 0xed2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a61600 INFO: task kworker/0:523:6831 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a390d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:855c2400 r5:855c2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f1e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a9f38c r4:85a9f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a72d00 r10:00000000 r9:85a72d00 r8:8027ed34 r7:ed2c9e60 r6:85a72d80 r5:855c2400 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:6834 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:6834 tgid:6834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2f5d84 r8:00000002 r7:60000113 r6:ed2f5d8c r5:855c0000 r4:855c0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f485000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1bd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9f78c r4:85a9f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9f78c r4:85a72e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0000 r8:85a72e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72e00 r8:8027ed34 r7:ed2c9e60 r6:85a72e80 r5:855c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f5fb0 to 0xed2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a61780 INFO: task kworker/0:525:6834 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a3e5f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:6838 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:6838 tgid:6838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2f9d84 r8:00000002 r7:60000113 r6:ed2f9d8c r5:855c1800 r4:855c1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f487000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9fb8c r4:85a9f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9fb8c r4:85a72f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c1800 r8:85a72f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72f00 r8:8027ed34 r7:ed2c9e60 r6:85a72f80 r5:855c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f9fb0 to 0xed2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a616c0 INFO: task kworker/0:526:6838 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a436d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:6840 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:6840 tgid:6840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2fdd84 r8:00000002 r7:60000013 r6:ed2fdd8c r5:855c3c00 r4:855c3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2fde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f48b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a61dc0 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:6842 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:6842 tgid:6842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed301d84 r8:00000002 r7:60000113 r6:ed301d8c r5:855c4800 r4:855c4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed301e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f48f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed30d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa8b8c r4:85aa8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aa8b8c r4:85a54100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a4b600 INFO: task kworker/0:528:6842 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a4af5000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855c5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85a54200 r8:8027ed34 r7:ed301e60 r6:85a54280 r5:855c5400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:6846 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:6846 tgid:6846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed311d84 r8:00000002 r7:60000013 r6:ed311d8c r5:855c6000 r4:855c6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed311e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f491000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed31b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa8f8c r4:85aa8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aa8f8c r4:85a54300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6000 r8:85a5432c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54300 r8:8027ed34 r7:ed301e60 r6:85a54380 r5:855c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed311fb0 to 0xed311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e240 INFO: task kworker/0:530:6846 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5153000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:85df1b8c r4:85df1800 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 task:kworker/0:531 state:D stack:0 pid:6848 tgid:6848 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855c6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed319e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855c6c00 r8:85a5442c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855c3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed325e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f497000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed335000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa9b8c r4:85aa9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aa9b8c r4:85a54500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3000 r8:85a5452c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54500 r8:8027ed34 r7:ed319e60 r6:85a54580 r5:855c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed325fb0 to 0xed325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e380 INFO: task kworker/0:532:6850 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5266000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ed32dd84 r8:00000002 r7:60000113 r6:ed32dd8c r5:85700000 r5:85700000 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ed641000 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:534 state:D stack:0 pid:6854 tgid:6854 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85700c00 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85700c00 r7:00000000 r6:83018000 r5:00001000 r4:7f499000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed343000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa9f8c r4:85aa9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aa9f8c r4:85a54700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85700c00 r8:85a5472c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54700 r8:8027ed34 r7:ed325e60 r6:85a54780 r5:85700c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed339fb0 to 0xed339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e6c0 INFO: task kworker/0:534:6854 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5a49000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:535 state:D stack:0 pid:6857 tgid:6857 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85701800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5d8e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85702400 r5:85702400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aaaf8c r4:85aaac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aaaf8c r4:85a54900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85702400 r8:85a5492c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54900 r8:8027ed34 r7:ed341e60 r6:85a54980 r5:85702400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed355fb0 to 0xed355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e8c0 INFO: task kworker/0:536:6859 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5d8e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:85703000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85aaa78c r4:85aaa400 r10:61c88647 r9:85703000 r8:85a54a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54a00 r8:8027ed34 r7:ed355e60 r6:85a54a80 r5:85703000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2edfb0 to 0xed2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e8c0 INFO: task kworker/0:537:6860 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5d8e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85703c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4ecc0 r5:85aaab8c r4:85aaa800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85704800 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aab78c r4:85aab400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aab78c r4:85a54b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85704800 r8:85a54b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54b00 r8:8027ed34 r7:ed355e60 r6:85a54c80 r5:85704800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed361fb0 to 0xed361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4ed40 INFO: task kworker/0:539:6864 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a6915000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:540 state:D stack:0 pid:6866 tgid:6866 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85705400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85a54d00 r8:8027ed34 r7:ed361e60 r6:85a54d80 r5:85705400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:6868 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:6868 tgid:6868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed37dd84 r8:00000002 r7:60000113 r6:ed37dd8c r5:853a4800 r4:853a4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed37de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f4a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb37000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aabb8c r4:85aab800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aabb8c r4:85a54e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a4800 r8:85a54e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54e00 r8:8027ed34 r7:ed361e60 r6:8477fd80 r5:853a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed37dfb0 to 0xed37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35180 INFO: task kworker/0:541:6868 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:85df1b8c r4:85df1800 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:542:6870 blocked for more than 479 seconds. r4:853a0c00 r5:853a0c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:853a0c00 r8:85a54eac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35280 INFO: task kworker/0:542:6870 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a7019000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:6871 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:6871 tgid:6871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed389d84 r8:00000002 r7:60000013 r6:ed389d8c r5:853a3c00 r4:853a3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed389e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35180 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85a54f00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853a3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed391e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f4ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca71000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab478c r4:85ab4400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab478c r4:85a54f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85a54f80 r8:8027ed34 r7:ed385e60 r6:8477ff00 r5:853a3000 5d60: 800f0013 ffffffff r5:85df1b8c r4:85df1800 r4:84bbf4c0 r5:853a1800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35b00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:6877 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:6877 tgid:6877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3a1d84 r8:00000002 r7:60000013 r6:ed3a1d8c r5:853a2400 r4:853a2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85ab4b8c r4:85ab4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 INFO: task kworker/0:547:6879 blocked for more than 479 seconds. r4:00000000 r5:85ab4f8c r4:85ab4c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e05e5dc0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:6882 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:6882 tgid:6882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3a9d84 r8:00000002 r7:60000113 r6:ed3a9d8c r5:85706c00 r4:85706c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85706c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85706c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab578c r4:85ab5400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab578c r4:85a2b200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85706c00 r8:85a2b22c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b200 r8:8027ed34 r7:ed39de60 r6:85a2b280 r5:85706c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a9fb0 to 0xed3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35c40 INFO: task kworker/0:548:6882 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a806a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:6885 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:6885 tgid:6885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3add84 r8:00000002 r7:60000113 r6:ed3add8c r5:84928000 r4:84928000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84928000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84928000 r7:00000000 r6:83018000 r5:00001000 r4:7f4b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab5b8c r4:85ab5800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab5b8c r4:85a2b300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84928000 r8:85a2b32c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b300 r8:8027ed34 r7:ed3a9e60 r6:85a2b380 r5:84928000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3adfb0 to 0xed3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35c40 INFO: task kworker/0:549:6885 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8472000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:6886 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:6886 tgid:6886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3b1d84 r8:00000002 r7:60000113 r6:ed3b1d8c r5:84928c00 r4:84928c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84928c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecec9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab638c r4:85ab6000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab638c r4:85a2b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84928c00 r8:85a2b42c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b400 r8:8027ed34 r7:ed3ade60 r6:85a2b480 r5:84928c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b1fb0 to 0xed3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35d40 INFO: task kworker/0:550:6886 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8512000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:6889 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:6889 tgid:6889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3b5d84 r8:00000002 r7:60000113 r6:ed3b5d8c r5:84929800 r4:84929800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84929800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84929800 r7:00000000 r6:83018000 r5:00001000 r4:7f4b7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece4b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab5f8c r4:85ab5c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab5f8c r4:85a2b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84929800 r8:85a2b52c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b500 r8:8027ed34 r7:ed3b1e60 r6:85a2b580 r5:84929800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b5fb0 to 0xed3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a1b280 INFO: task kworker/0:551:6889 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8512000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:6890 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:6890 tgid:6890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed36dd84 r8:00000002 r7:60000113 r6:ed36dd8c r5:8492a400 r4:8492a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed36de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f4bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1fd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab678c r4:85ab6400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab678c r4:85a2b600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492a400 r8:85a2b62c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b600 r8:8027ed34 r7:ed3b1e60 r6:85a2b680 r5:8492a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed36dfb0 to 0xed36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a1b100 INFO: task kworker/0:552:6890 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8e38000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:6891 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:6891 tgid:6891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3b9d84 r8:00000002 r7:60000113 r6:ed3b9d8c r5:8492b000 r4:8492b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492b000 r7:00000000 r6:83018000 r5:00001000 r4:7f4bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed225000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab6b8c r4:85ab6800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab6b8c r4:85a2b700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492b000 r8:85a2b72c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b700 r8:8027ed34 r7:ed36de60 r6:85a2b780 r5:8492b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b9fb0 to 0xed3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a1b100 INFO: task kworker/0:553:6891 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8fc9000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:554:6894 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:6894 tgid:6894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3bdd84 r8:00000002 r7:60000113 r6:ed3bdd8c r5:8492bc00 r4:8492bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f4bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed22f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab6f8c r4:85ab6c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab6f8c r4:85a2b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492bc00 r8:85a2b82c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b800 r8:8027ed34 r7:ed3b9e60 r6:85a2b880 r5:8492bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3bdfb0 to 0xed3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a1b440 INFO: task kworker/0:554:6894 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8fc9000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)